Analysis
-
max time kernel
100s -
max time network
156s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
17-02-2025 10:24
Behavioral task
behavioral1
Sample
build.s.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
build.s.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
build.s.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
build.s.apk
-
Size
267KB
-
MD5
46fd7ae90adad17163e51191b3c3704a
-
SHA1
1e111450b5b292d9d192513000f9ffb381709296
-
SHA256
4d89afb5e33ae85630d73d0b3d9765f523b9e0b6e1e80e4ce50780ea486b8315
-
SHA512
5acda92aa8ed43d8b5bb6f7861e08e138a4816cc7459faf5399e2b093fc5b9724101e25f25c7d9a3877386eb607ff9ae279156ebeae0227c5220019e42de100b
-
SSDEEP
6144:AE+ohBRPxdh+0GohVa8g1wH9U75ENc7LNP900:AE+ofR119VXgGHyd9x
Malware Config
Signatures
-
pid Process 4570 com.etechd.l3mon -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.etechd.l3mon -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.etechd.l3mon