Analysis
-
max time kernel
88s -
max time network
132s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
14/01/2025, 18:22
Behavioral task
behavioral1
Sample
com-mod-tasker-mod-apk-v6-4-9-beta-5405.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
com-mod-tasker-mod-apk-v6-4-9-beta-5405.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
com-mod-tasker-mod-apk-v6-4-9-beta-5405.apk
Resource
android-x86-arm-20240624-en
General
-
Target
com-mod-tasker-mod-apk-v6-4-9-beta-5405.apk
-
Size
40.1MB
-
MD5
a3e67dd6627319f1bf57f22d47bd779e
-
SHA1
785d513dc4be4cfa90f41ad18e6935ffe8d5a2e3
-
SHA256
d14247ea058ba1c1e625370d00dcfc41afd69275065be576abb008936dc87db2
-
SHA512
7fe2023bebbaef5fc57001430f20483b127480b9342d7edf0866b08f65eb10e6b046f782e312cf6e73fd04324be311b74d80f2eb39c95a375c9293b66d1324ff
-
SSDEEP
786432:clLgf64/Szm6qRr8PwCQ7I+j7P3AAUsYi2IRSPzOdmdljlVWgXijsIJe:clgd/SSCPoD7PQALX2I4Pzsmd4gSI8e
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener net.dinglisch.android.taskerm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock net.dinglisch.android.taskerm -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground net.dinglisch.android.taskerm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal net.dinglisch.android.taskerm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo net.dinglisch.android.taskerm -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo net.dinglisch.android.taskerm
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5fc315784dd37b78f89d94b7395f5c661
SHA1b471b5147168646cea413c1d7a8ebb3d2b00a7b8
SHA256ea4ee4aa16481a0376e9db18b9de9caae33bddb4de9c0a8f0d3da1ec5fdd2ef6
SHA512c0deffe686fb1c4f79bd3df8f1fef52188a8ec718638d98a448e99329729e16b71694472c05de849f54f8d58178f7568ae7017375216337446257d2a5c8e859b
-
/data/data/net.dinglisch.android.taskerm/files/profileinstaller_profileWrittenFor_lastUpdateTime.dat
Filesize8B
MD5a38fee255b0f39b409c326e27e4c063e
SHA1d9b5a18d7e2196f39d9e3aed520db586b3b685a9
SHA2563272163671b951adcba7f61c80aff2531e6758f47cc2f6c23bf1aa24fc951aa2
SHA512402f3c0c8c7e2d1a92b2451b605851be4a9558d1374c4a36ce44bc3e486d714a05040450609d54fe2d46d3f6b3f75f06aa98ed16245dc3ec3024ca7b9235a404
-
Filesize
4KB
MD50eb157e1a86d4d00aa601dd2f6ff3ee3
SHA1fee434f784e73cc7916322e949f727caf8363102
SHA256b9a8194b71a046e8c0eb30995827b582b4bea834f630a5df2483b778a7d7d8a4
SHA512b9b79b8c3af8a3f140df230fd89e95206358ba50ff214e7323a2dbbe2937b795f970e588302ffd5d721318bd597ce0a27af26d6cdb07f45569c30209845082a8
-
Filesize
512B
MD564d9d28058dac1bb052dddb5ff56c4c2
SHA15749d0a5ad48bfe6e715899268a44807053aa8a6
SHA2568afbdeaf28484205ee77fcee56dcacc206fb175c41b0c42b0d26d703cc53310d
SHA51231c0ea7454d5a77b9c9f02aa4a089dcc1b0f62d8629b3f991dff1c265cc9dd84960bece6a9d96adbc6c19714b20e3fcd5e3dae0ed88dc4c1ec3a274c34a99019
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5175151eccd65238af046d47bad256b95
SHA17b8338394837514936d72bd8975638ba89fa6313
SHA2566e19eefc96485da3bd1e4888323ddae4711fc85ca83f8aa921f698941fd57dbd
SHA5127fc28f731ee78352b9c1c4fc7d3bcf7812d3522ab550bbd2185b7545437e477f4a75489a91ff4ec8e3c6730454ccb5ab204a334807ae08ff88075107899b6fec
-
Filesize
108KB
MD5562d27d082d487848bf23517f05d9b23
SHA1efcf95e09291fa5f60f1916562ce153cf897f36c
SHA2567b6803ae9c8b1d971994d64242c360949ab4093318f529d9bd53125770ed5d27
SHA5120c34757045a8e90873fc37086d3f41add5dbfeeb1912291eff6cab777845c9818bc6c982950f8cdb6e00df42638b79d5d1bcd024c16e4928baa12b0de7ea1469
-
Filesize
30B
MD546ff7c58b31f8d1c6465be077aa8caea
SHA113fe5acaa412b68edd2cc730659bd5dbf2e3673a
SHA25617c10427264db61e43f37be47631972bc16d7dc33b319006904536487fc9acb3
SHA5125b451f026c50aaf0a62b9586bfc3046e21f110201463ef2fc9068b095e52a80b75b2ebac833cd6d2d079a30c44a314a399c2ebf53ab3e8ac77fa9d3b5757b400
-
Filesize
5KB
MD535638d2cda19c3c516b9c43c85a3cfb9
SHA14b751b9241b88b6b1ca18d503c49529daa2bdc9e
SHA256c815a334e1dac5fe6c0e066c215587b5f70355de48097760d013bbebec435f20
SHA512008fa223980c3508e6375c53c1b2ce4783b4be11a1cfd78d7ef32c64fdf221be09789c189dfeaf126fdfaa9e63aef7d40864e8f52d9657edc1b4f8e361db6b53
-
Filesize
11KB
MD5da2c5334699fa6016ba49c38c720a8a5
SHA15b617c042589476942ba34071ac64ca4bb49cb69
SHA2560f4a6ee9886575dc39216c9ed28cb7bff859a2bf8b976aea6bf5efbbd45f4557
SHA5123fc90cf7ba0a8a998f9f5fdfa77939cf7df4df14ffe7ecadcffa04aecc9d58890d2b617d756ed9f9cd113f59f47ffa9b4bf31287352e66cf5dfb926a5601d47a