Analysis
-
max time kernel
25s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
20-11-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
f69533838fdd075dfe98d3c36b7edf4df84176dc73203f5e0a0f03227b29c566.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
f69533838fdd075dfe98d3c36b7edf4df84176dc73203f5e0a0f03227b29c566.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f69533838fdd075dfe98d3c36b7edf4df84176dc73203f5e0a0f03227b29c566.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
f69533838fdd075dfe98d3c36b7edf4df84176dc73203f5e0a0f03227b29c566.apk
-
Size
2.2MB
-
MD5
cec599ff3cd1776cafc708843dae321f
-
SHA1
ee1abd108e160f8f2b358679a189a438a49904fb
-
SHA256
f69533838fdd075dfe98d3c36b7edf4df84176dc73203f5e0a0f03227b29c566
-
SHA512
cbb431e1f77b53abbe4197dc06ee5c2cff9f4b1860e421d6b17ed0a81b24919a50f722c9ea19df5dac144bfc970c8d156ccd73c64a4a8e7bc7b8977e1f75b59b
-
SSDEEP
49152:eRKKry6UNSjhGfnVdgbv1geiIIbSb5qdxIa99nygSjRcK8L:egKrFUsjhGvVcgpub5kIa8Rc/L
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.htkorsupport.androiddescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.htkorsupport.android -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.htkorsupport.androiddescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.htkorsupport.android -
Checks the presence of a debugger
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.htkorsupport.androiddescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.htkorsupport.android -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.htkorsupport.androiddescription ioc process File opened for read /proc/cpuinfo com.htkorsupport.android -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.htkorsupport.androiddescription ioc process File opened for read /proc/meminfo com.htkorsupport.android
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5554c8a4da62c92f458a37fe9120a107f
SHA1fe1c86cab91133c3d7e9b360ffc43368aa894c0c
SHA2561ea6550f743697eafad735d8a8a5b87770fe5ad6d351d1c60fc5e8f4522a470a
SHA512997e5dfbc5d45da746bd42edbd7384f927e9c7d15e50e58076c9b03dd01eba28936f4d2fa66565cdf3b3621b292cd06d1e34bee46fdf4227e1c0797a2c859054
-
Filesize
8B
MD575d81a04aa1dc34ee8ac484d8191a60a
SHA13005796813355490b06b3a179bbf732dd1133725
SHA256ef4bd17e17ee1e9f2c4b9adf75af1ffc232f051335228c04df0575b666e25ddc
SHA512196ac45b2566cad34038ba68fbe80006a5a6ace99272138e899fb89ba24914101ec516fcf360e1ba22260242fe282ecf63a079a0f3dcf853bd78a85bb71d6371
-
Filesize
1KB
MD57140b7e842ee52b25d6055b689e0bee7
SHA1df2d38e2d0e1e494eb371475309806171a302709
SHA2563f817e24e344db23539ec33dee3f7cc0987479e6aec909bfa86ab3c6e5af12a3
SHA512eb084ab85a5fb2efd98f6b654527ebd2e68d409426f28d34e4a71e8705e70c18821ddee757e19c9228a7b5ba4eddb7908d8003faae1d093d5216fac20ae93240