Analysis
-
max time kernel
3s -
max time network
51s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06/12/2024, 01:39
Behavioral task
behavioral1
Sample
Android_Faker_v1.8.4_Premiumuserupload.in.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Android_Faker_v1.8.4_Premiumuserupload.in.apk
-
Size
25.9MB
-
MD5
5dd71755429d9dd6646ee944a7a9b5d9
-
SHA1
86b0a23ca124864ca6673ad443c445da127df47f
-
SHA256
61d6ad05c887bd0027ea828098ccb799ab7b8b108b3285a2338274659dc3c13a
-
SHA512
d6c67a0cc2dd66393f1a983e2fe00a8341df30d322c87051aa788b403325e9642515695bc4b8cc49381467686d2fe88b320ab8f44950471a65392ceade6f5d58
-
SSDEEP
393216:N+O/TGb4pwKPCHp/KxTllHJq5vSio3fkl9yfZyICfkYI6L+uq:IITiqDPCJ/ETlu5ZQRlT
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /system_ext/framework/androidx.window.sidecar.jar 4499 com.android1500.androidfaker /system_ext/framework/androidx.window.sidecar.jar 4499 com.android1500.androidfaker -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.android1500.androidfaker -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android1500.androidfaker
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5bdf3529e80318eb14e53a5bf3720c10d
SHA125c9ace4b1af6e80ebb2572345972c56505969ba
SHA256bbc8300dd1e9cd08de8f66560c1ac2c928615b72b51cef9649f88974f586d64b
SHA51248b9c2d01171bb651b9b54826baa51f4add48431a3efd8ceb5f7cc3bcd6f8f37edf47fabb24349dd15b3a02329cd450f90a8d164bf4f8dfae554bf3b35a8a55b