Analysis
-
max time kernel
297s -
max time network
307s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
26-01-2025 14:16
Static task
static1
Behavioral task
behavioral1
Sample
one68_1_1.0.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
one68_1_1.0.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
one68_1_1.0.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
one68_1_1.0.apk
-
Size
408KB
-
MD5
611fc9c56d89133493ff3724225d3389
-
SHA1
65ee804a41bce76cc409a8b4ef9c031fbfaf03d6
-
SHA256
ffe4cfde23a1ef557f7dc56f53b3713d8faa9e47ae6562b61ffa1887e5d2d56e
-
SHA512
91c8cfb8962ab39c643e6e887b11f1bc6ba79bcdfa44d2bdbad8416d86123924aaa6ce5974be294fbb73693dfe25a78944d23eb22ba23d0d036d39ae84f421bf
-
SSDEEP
6144:bEyOStCyM8CJDJS6vCCgDEtb4ZqZb7TCVkiPLmVtCmKaLmYituaFcVMO:hVJgDJQDab4IZbHkm2mDLP8cWO
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.goyal.one68 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.goyal.one68 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.goyal.one68