Analysis
-
max time kernel
23s -
max time network
150s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
20-11-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a.apk
-
Size
3.5MB
-
MD5
58d91834a5e9b84300d94eb218aebe2d
-
SHA1
dee0a096d251bb21091f13cfff105f047349cc11
-
SHA256
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a
-
SHA512
fabf5db512b175e619185053dbc5a49bbed4b7f2c1bf74250ce006c1f288debede133fa677fc1f24b20f0fa12324d207ef0d55e861df97e8d272e6b1f36af32e
-
SSDEEP
98304:zrYhi7UkHvaV4TNtKIGgh8tuY0BhHNPpSi:fYheUkHvaV4TNtYpcBJp
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.myunion.servicedescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.myunion.service -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.myunion.servicedescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.myunion.service -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.myunion.servicedescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.myunion.service -
Checks the presence of a debugger
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.myunion.servicedescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.myunion.service -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.myunion.servicedescription ioc process File opened for read /proc/cpuinfo com.myunion.service -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.myunion.servicedescription ioc process File opened for read /proc/meminfo com.myunion.service
Processes
-
com.myunion.service1⤵
- Obtains sensitive information copied to the device clipboard
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:5125
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD54ce538912a67b69481306035aa1ca40c
SHA11a82313f950e0dd2fd8dd2c900cc6f3a7d759d23
SHA256618234e8f570ebf4657cc84e1ae157835cdc37e6be7e28dc592a18f98d4f2993
SHA512df234c4b56d02f5272e28885f17b2a7668d0605cc0fc3cc7d256f17d8603c2217d71cadd1c9c676b1b47b3be70ede494009623a8d5baf5ba92169a29ce97cf0d
-
Filesize
8B
MD5c5fbb316256061e729cabea3f2ff9f0a
SHA185b11645f43f49aea5cdc65525ccfbd3875f43b9
SHA25643367479a54239857691a93d4d0b4daa94a23eb343334ad518057664596442ff
SHA512d2326a509facea68c765b73ee431d79af0af4aac7a1582000f851ba4d25829ffc8d6b45a5cb890d111328195834541a2ce87a0ef641dd2aae9046cbf6df46f75
-
Filesize
1KB
MD520b313e35f7e795e3b0db952f3a8f480
SHA1d576d4836fc6787e263dd2a1c12730e77fb5a50e
SHA256c9c81a7cdab7f38b403280d4ff23c44f494635db03b30de0eb74049888854604
SHA5122bf95171265e22e65884ba89c9cdc81b910dbf1cf2ed67d315d9f3859cc393ebf778d266b305d03273645c5362f7ed662d1808868b67b87ee2b83bb5a4eff1ae