Analysis
-
max time kernel
47s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
23-11-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
AndChecker.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
AndChecker.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
AndChecker.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
AndChecker.apk
-
Size
8.5MB
-
MD5
3e22fa7e6838639f6fc593d4e87e5c8c
-
SHA1
4f3399ebd5e090a6089c2012254ccd78c054e620
-
SHA256
7178832f203c705a977f6a9da477d862bdc1bbe893d50266473f010eacd640c5
-
SHA512
0ebf21b7f5777a4dccbe5c8fa3b236151575b09e5430ccf771bf4686078b5c95a314b3bf12522a5fd7b4dd4a7b45fd87afdf5cbe1bc6927ccd445c512858af65
-
SSDEEP
196608:Y/fZptcXuYUm01PAmsxwnK8NyvsIgXnEoEmkSoewsTBMJ03XAM:2fieYO1PWwnK+lnpZ+stMJYX1
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD549fb09ba8e2372cce1619b2e2a21ea96
SHA10273dbfb11aa56f7aa1b1b6f2043018eeff7a8d7
SHA256cad0d79de8d66a314948199450e1cafcaf2fae51bc3945f34b510f6c00942c20
SHA512c3abfc2f197300432125c5ef9296274adaeddfab7e2a62896facd3ce830ec0dad694331d05e31fbea90d922589f909565166efb6f51c0342b26874b36d743a66
-
Filesize
5KB
MD5a0bced221e57fd10f501f6f1ec99efb4
SHA1f89c6076daeef32d26b513c0b822fd040e4a07d3
SHA256fd0aa2a5787a8a087482fa730e2382a3aa3c2ea5ef0f6e0bc6864738e6fa7df8
SHA512c35e7077fce382ecf8b9499743a498763607e1108c3fb87f1c3fe652bb2a983309204dbbcd9031971af9dd30c1ed1888e5fa630e15a05ec08fd17957945b2f47
-
Filesize
9KB
MD598d9ef7b140b4a09b169e874f4c841e1
SHA147b89036fe8885f7d94a5ec41c4f4f0672ba939f
SHA2563752f97a4d8427c5225fbd68f3c11b53484e95de47e44825f5c3b5516da6dd45
SHA512dd0a557d24df01696bc5bbbe4427775aa00f7f8872d447cb6d92b3ef10ce664265d6de172ecbdcb104018c73ff1a5891451898bacb8881baeb38333ece75f191