Analysis
-
max time kernel
13s -
max time network
136s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
07-12-2024 03:15
Behavioral task
behavioral1
Sample
bce898587f683c70ea12b8612dd9dc1f791fa748e7c1f4584f4afb2009a1e135.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bce898587f683c70ea12b8612dd9dc1f791fa748e7c1f4584f4afb2009a1e135.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bce898587f683c70ea12b8612dd9dc1f791fa748e7c1f4584f4afb2009a1e135.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
bce898587f683c70ea12b8612dd9dc1f791fa748e7c1f4584f4afb2009a1e135.apk
-
Size
267KB
-
MD5
dd1c4e06c9d42eaab11b8345f9e3fbe9
-
SHA1
f1824de3d19988e175117514d80a4a5eee89f114
-
SHA256
bce898587f683c70ea12b8612dd9dc1f791fa748e7c1f4584f4afb2009a1e135
-
SHA512
d2c0e3ca6b341cdb2691b4f18593ba552f061870ad61774c136436a4de2cbde15a0e5ce7e2a2d8ada674f3af636522164bb0ea43474503bcfb8198ccef57d2f0
-
SSDEEP
6144:VYHgOw673KBoeORPBAYsI7Nu5K6l3uttKXhaG0nSk+YbLvcFJGvNv90sh:VYJsoRnOIkgWqtKj0njDR9ph
Malware Config
Signatures
-
pid Process 4434 com.etechd.l3mon -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.etechd.l3mon -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.etechd.l3mon