Analysis
-
max time kernel
47s -
max time network
156s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
20-11-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
330d0a7e999808de59f9f1e20020bbd51de171080d1193d8209ceb1b77559c26.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
330d0a7e999808de59f9f1e20020bbd51de171080d1193d8209ceb1b77559c26.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
330d0a7e999808de59f9f1e20020bbd51de171080d1193d8209ceb1b77559c26.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
330d0a7e999808de59f9f1e20020bbd51de171080d1193d8209ceb1b77559c26.apk
-
Size
4.7MB
-
MD5
e232792cccb565ecd32c4084d940588c
-
SHA1
7419686a3632ecdd54be0d4dcbbb6cf0fcf038a7
-
SHA256
330d0a7e999808de59f9f1e20020bbd51de171080d1193d8209ceb1b77559c26
-
SHA512
f37a8367fd9951fa5e0024a3764a22f9fdbf121ac7d00fbe8a6ddcf6eb7f67e89ac798aa6ae6014bc588b446528052d4e4078289990d0a1801573aabf1e743cd
-
SSDEEP
98304:l7SZnzyBD+rNvoDORiwRubTe6T1F28D+7urS4xIQdDPN9HPJ:MZneBD+rNQOxRubTe6ZF28DiuS4xZ
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.example.myapplicatiowdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.myapplicatiow -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.example.myapplicatiowdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.myapplicatiow -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.example.myapplicatiowdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver com.example.myapplicatiow -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.example.myapplicatiowdescription ioc Process File opened for read /proc/meminfo com.example.myapplicatiow
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD50888912fdf2d7074b6e7de79a5f54ab6
SHA123fb0d2cb01ee5017f8a2879c9e1f5f38d51fab5
SHA25610ebb04082b8b80f31fc7bc48e6d19e5c087ad48c022130953079129248b4ddf
SHA512c58435a2c057f25049c7d46c6c37cdbd1f6802a9b5afd65dd7984513612dbc1d6ce7ad181a7e9c360fb5bde60e9cf258bf2750a622dc9c94046f0a12c7801ed6
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5009d0e9de03b0aa937553d88e295d571
SHA12cb2fb57bb2a936e07999ad2be7c1cbe2ee25386
SHA2564552a1e5d45f42352dfee13de4acbfe2746bc537917c6fbbbf2a21175fa6c263
SHA5123eac2666dc6686966a1d35952db03fc33e592dd729e7ed053ab17e92988264503dfc55770a414d4a8bb7c3bd71106d54024e4467ab376964757cc2c4b587af7e
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5d1ba7c809fbba06247a488cef9336779
SHA188f1e1dc1d83860ab80628c644873c6a93fc35cf
SHA256b3c3f09534e43adb3c01028d16ed001e9a571c1fca489658bf7d009ac12f4c42
SHA5122e8470d3311b880f4932d8a905e9dfe7f0c3a90ac56a0d3635c31b9ea0ec0be72efe0285d50dbabd90f19c387415b6bea5de78f6552a5bf3e8e747398928f3c3
-
Filesize
108KB
MD5820a9af927c58b688abddaa29e9e22e5
SHA13582941d3ff43b3fa57d9cad58c8b8aeb9efd57c
SHA256582dc7ba14e95cf98328e185b708b84ac7a0010b06f5f3674b92cc6be66d7e0c
SHA5127a858d13663e228e6a18bd6389d8e62008b533757a8de64be6b429365eae0ac936f0dce1c88424a0fdbc9e59fbf0b4dbf6b46e241b3b4ecc692f6bd0fdef4997