Analysis
-
max time kernel
37s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
20-11-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
86551a262b0ab4a20d54fd931cad2d0aa393853e378746893f4f61de0c9173a7.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
86551a262b0ab4a20d54fd931cad2d0aa393853e378746893f4f61de0c9173a7.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
86551a262b0ab4a20d54fd931cad2d0aa393853e378746893f4f61de0c9173a7.apk
-
Size
1.2MB
-
MD5
0f8dca99ce56c2e0931a29cc6d841721
-
SHA1
5902f47aeb5198d62f923242d7fc102aed30707e
-
SHA256
86551a262b0ab4a20d54fd931cad2d0aa393853e378746893f4f61de0c9173a7
-
SHA512
9eb63708bc1e4638955e6beb499ca107f70fcb934b10949c38224f951740600f96151c92535e75054e6357b21a057960776d07a506e93ba68025a7d0a3c784ca
-
SSDEEP
24576:PeM9P5EZJbpxv7rJPmhRXxO1/YM35honoUXzs+x0f5Mdtv:PeyqLLBPGRoT3TioUDTxW8tv
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: 5C36123F5245AF470A490D45@AdobeOrg
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
i8iwk.lqoo2description ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener i8iwk.lqoo2 -
Requests changing the default SMS application. 2 TTPs 1 IoCs
Processes:
i8iwk.lqoo2description ioc process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT i8iwk.lqoo2 -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
i8iwk.lqoo2description ioc process Framework API call javax.crypto.Cipher.doFinal i8iwk.lqoo2 -
Checks CPU information 2 TTPs 1 IoCs
Processes:
i8iwk.lqoo2description ioc process File opened for read /proc/cpuinfo i8iwk.lqoo2 -
Checks memory information 2 TTPs 1 IoCs
Processes:
i8iwk.lqoo2description ioc process File opened for read /proc/meminfo i8iwk.lqoo2
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD587fd5a5617d55d904de6e2210fc218e3
SHA1199a47008837e591dd4e4b2d5de07cc4260623a4
SHA2568b7274c55179f74587bffc099f6b9b5eaa8aad46c581f004c2e82affdc6ab10a
SHA512dbf77bcf609a8f7ac8a15e339c5a7310d65ba960626787d9befb4d911c44343dbabe5df857363a686ed044aaceb4df68e5f1880c24b35c0583c89dc8d38a49a6
-
Filesize
8B
MD597846544ea3100cc4a7b73d87dfb9ec8
SHA1e05806c0f9aebff18b59bdaf14b04e9f6546b782
SHA256ac81444651d4174c0a6cf2130a8613f1ddc982ca85af4dda6b443b03e47e2a5a
SHA5126383626b7b4c478e5ce81e9f6a3d30dd1d0ce0147c2ec4585823b1b37e07fd75fcd0c19bc6fd39b0816b8f1a147baa9112b49d4f1afc4725eac7d74ce0de6c83