Analysis
-
max time kernel
149s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
23-01-2025 22:04
Behavioral task
behavioral1
Sample
fcf9951d33c66a213e264148765a1e3c230aba8b74d72f62b810db105bd52a4b.apk
Resource
android-x64-arm64-20240910-en
4 signatures
150 seconds
General
-
Target
fcf9951d33c66a213e264148765a1e3c230aba8b74d72f62b810db105bd52a4b.apk
-
Size
2.5MB
-
MD5
714a4a5fdcd595a229ed63353d6273a6
-
SHA1
b86926a4e1041877b3d11cea38c3df3ce371d515
-
SHA256
fcf9951d33c66a213e264148765a1e3c230aba8b74d72f62b810db105bd52a4b
-
SHA512
9cb528d7f9a1788fe3ad726a83bc39c450b91df99fb51576f51e8799e90b86da24f8511839291377de1d3b856a6883b5aa1d68b55ad53cb628e08758e0d60b08
-
SSDEEP
49152:6JWu0xALn1gX3NTPhVFYiRmK37mH/IyRNPBamFAAxup6teRRFT/l:6c6WTvFYvaK/5bPBagXxup6w/l
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.kero.fmrtmedrfgherhetj -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.kero.fmrtmedrfgherhetj -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.kero.fmrtmedrfgherhetj -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.kero.fmrtmedrfgherhetj