Analysis
-
max time kernel
14s -
max time network
139s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06-12-2024 15:47
Behavioral task
behavioral1
Sample
build.s.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
build.s.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
build.s.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
build.s.apk
-
Size
267KB
-
MD5
6ef5af90e55da3e3060a2a3daca75e8f
-
SHA1
1d8fb6a2061feb0b3493591bd18b13dd7ebc67e3
-
SHA256
1d000ef8d964ba22acf820debd2c24222ff34353c145d69e4266eb2cc7588ba3
-
SHA512
be954dc69c6b800141ba83d492fa5b5de880f2abe9f4cf455a6813f3f835babf755dd3ff11fc71cd150b3376630aa24ca51cce2e62dc487d0f8d4ffbb9e3d302
-
SSDEEP
6144:VGXDhYcKa6we5EoC29CZQORrWLn6BuEIQbq3AxrqbvNv90F:VFRpR5FCsC9rWL6HBe3sqB9Y
Malware Config
Signatures
-
pid Process 4474 com.etechd.l3mon -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.etechd.l3mon -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.etechd.l3mon