Analysis
-
max time kernel
15s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
06-02-2025 22:03
Behavioral task
behavioral1
Sample
0fdaf59e05e59b7013c7a24c5429d7932505e6f03ad3e6a1d794dbcd0c2a590d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
0fdaf59e05e59b7013c7a24c5429d7932505e6f03ad3e6a1d794dbcd0c2a590d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0fdaf59e05e59b7013c7a24c5429d7932505e6f03ad3e6a1d794dbcd0c2a590d.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
0fdaf59e05e59b7013c7a24c5429d7932505e6f03ad3e6a1d794dbcd0c2a590d.apk
-
Size
3.7MB
-
MD5
a325db6558c6f6f1029cf46214377c97
-
SHA1
0b4bcd61485cef461fd48df28dcb03d49d7640d2
-
SHA256
0fdaf59e05e59b7013c7a24c5429d7932505e6f03ad3e6a1d794dbcd0c2a590d
-
SHA512
701d82c6e7b9e8bc20c46e254293d5f3262da406b81a4238a6115001cf800bb6a184713b460440638e8554e8b456e92939bf966237644e86f28db55f1d8b5e05
-
SSDEEP
49152:GgShUVpA25jLKOa8M5Lzzf1q2Jtema+yDvq8sFFP2NEofEcEUh9KXJVntZk+lY6g:ppA2Jnz2fyGdFFP27f1njKZhtm+oWcP
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tencent.mm -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tencent.mm -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tencent.mm -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tencent.mm -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tencent.mm -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.tencent.mm -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.tencent.mm -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4977
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5489d582cc06fce9d49353d5c70f23221
SHA174d5b8b9aae52f130313920bc3ba9ea8b4ead856
SHA25622c7daed17105a3e9eeb591b83a35959f6931f30018d55c3501412780ac07d86
SHA512456b8bea6a868ad6ba167a51dde73083cfccc8d9af4dfd8f364d6036b0ce065584c3b6f9bf9ea5cd79218e21cd7cb22c7402913400ed23635dcb9a4da667faf5
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD52c457b961313d16ca7ef4486b093c019
SHA1de1dc05669029d51af25a7d41eef1de6f481f664
SHA256180702bcd83d451e761774efe560ac9f970b7d3f93a2d13dd459a6fa5eb557d9
SHA512828dd2441d4befe79397d6af795a56dc7eb3be8bac32bd2c2a5a1f4ebc3d7306c4b9392000105c3dc11a2ba98252423d5082da878947f0ca9bd189c13fc81ea0
-
Filesize
108KB
MD53313843f5213449bf2297ae7e7d3e165
SHA12a71973bd6c685f2bb87aec674c215ac1c57b7cc
SHA256f8c14b18c53fbe88b6a8a2005ef29f078b901fd361c8d8120e5fddc49820e145
SHA51237283b14644ae31aa89165f0fb64edcf06c51122e28c9648231bf05a6b2adfbde2888e636a23467ae8c476f2b2aeeaa0d41d34a5a855d1b58907d9c699ff0d4e
-
Filesize
173KB
MD5bda4ab4c8d41f38335a6a25b411ce622
SHA153649120b500520b6ac8235ce6c93b8ee0734b15
SHA25632feef7200ba7f1b75d8823ee5a117f60178794a7419818463fa1d9f809f8bb3
SHA5122918f35ae2e44dfff4100c97f13064f0c59ef7da901b547933a1db6f4a1ba4530a68bb59789e4615e44777869080dfd5fae7a25d88465e8284d9f97138f513c5