Analysis
-
max time kernel
141s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
23/03/2025, 15:53
Behavioral task
behavioral1
Sample
adcc3a2f7cef4a20d5985f7d6c2290a0.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
adcc3a2f7cef4a20d5985f7d6c2290a0.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
adcc3a2f7cef4a20d5985f7d6c2290a0.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
adcc3a2f7cef4a20d5985f7d6c2290a0.apk
-
Size
6.7MB
-
MD5
adcc3a2f7cef4a20d5985f7d6c2290a0
-
SHA1
49cc48340ee2397c09f0484805e49e223e92b3e4
-
SHA256
3d1e6b84b50e9dbcfdc6b609aa57d28fa06f78e1f3cd9285e07ba8e39f419bfb
-
SHA512
52720c88b187718e7b3a4e557782a4794f2e98cbd15a14de04d80921ff8d3c9eb0cd5b8bc0c4705c867f81347f941e8fff9d14b1b850e432307e9da4c81369a7
-
SSDEEP
98304:1TOGZpDDsRB06CE3BFEi0c0Sll0pkQt8w1PGDdfnVBwvnBFWGm6pMn5fm+PSpKJ:1TvDDsRB0TE3BD70Cw1ODdWRcxqKJ
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 8 IoCs
ioc Process /data/local/su amoungus.among.us.free.online.game /data/local/bin/su amoungus.among.us.free.online.game /sbin/su amoungus.among.us.free.online.game /system/bin/su amoungus.among.us.free.online.game /data/local/xbin/su amoungus.among.us.free.online.game /system/bin/failsafe/su amoungus.among.us.free.online.game /system/sd/xbin/su amoungus.among.us.free.online.game /system/xbin/su amoungus.among.us.free.online.game -
Checks Android system properties for emulator presence. 1 TTPs 2 IoCs
description ioc Process Accessed system property key: ro.hardware amoungus.among.us.free.online.game Accessed system property key: ro.product.device amoungus.among.us.free.online.game -
Checks known Qemu pipes. 1 TTPs 2 IoCs
Checks for known pipes used by the Android emulator to communicate with the host.
ioc Process /dev/socket/qemud amoungus.among.us.free.online.game /dev/qemu_pipe amoungus.among.us.free.online.game -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener amoungus.among.us.free.online.game -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses amoungus.among.us.free.online.game -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock amoungus.among.us.free.online.game -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo amoungus.among.us.free.online.game -
Reads information about phone network operator. 1 TTPs
-
Requests cell location 1 TTPs 1 IoCs
Uses Android APIs to to get current cell information.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getAllCellInfo amoungus.among.us.free.online.game -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo amoungus.among.us.free.online.game -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo amoungus.among.us.free.online.game
Processes
-
amoungus.among.us.free.online.game1⤵
- Checks if the Android device is rooted.
- Checks Android system properties for emulator presence.
- Checks known Qemu pipes.
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Queries information about active data network
- Requests cell location
- Checks CPU information
- Checks memory information
PID:4714
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD579b2894e8dd703b7e49f1b1491804b58
SHA11fdf4e4fd2744266c0de024407357f9da9798b3f
SHA2569277d1e004cf41222eb9640ba159063417586b8c6d2f9349483164d5692b6b3b
SHA5124396be5b8534048bd351ef8c7329722e0f6657d5735a9592ee62f372083c6d3faa4fc1a634f5570cb658eb51da7e21f4d29a7a5ee060ad498ffa53eda3e4ac6d
-
Filesize
16KB
MD5a58ea6772a1d60d96a38a5268b2aebeb
SHA18cd26c06434665fba9b1347902275faa9c9c4620
SHA2565c463a1b5482edcf6fe8cea2038535ad305a5a9bbe6431fff8e618f00f999cd1
SHA512b63f0d50fd4e8482dc6bd3314a8ab1131154bbdf571b84a8b9de0b1675dd9aaad74a0a9ecf6f022ccb9e4f99280ff1c9e6df28b14d9cd5f2c00c8e0beab02cb9
-
Filesize
16KB
MD5bf404141c55ea51a5491a634e22f0a06
SHA131fa73439da437ae00b790393882a867fffe6074
SHA256f8cfda9683eeb55e2a2349fa434045e06f2471997b9921371b52f49371282119
SHA51213f12e697ac9ecd3a11c00902d8b26609ff9ee86a46644d19be5cde18837cca393b91208b5c67826b7aec8ae688cb65d91df893ef47a6fdd8c2ddd32df8a949a
-
Filesize
16KB
MD53294249676b3b97f2aee7521c84d7480
SHA1ae31d3cd4ff59f70ed8fe0454b3165c57d66c16b
SHA256f2446f7786c30587b1afde807d6f4a236bbf11397fdc1db1f8b68370e35ab48d
SHA51275e4065b846a1202a912540de1970abf403820f3fb722b96b07c80b707eeba8ed63a89a00a0991ddd2abae2559bab484aafa99255a7472218de2811bca6ad815
-
Filesize
16KB
MD5675c2eeb008ccead098149ef540727ca
SHA1f02a2933f60b7685f5b456874113bcde4f3bb808
SHA256c08736eb7e505d90f686fa2421fe29d5e77b589229a39a698a16b78f6579c0b7
SHA51252d7b13a65de0b48871a1b5a1a8fde9fb2efb7af745a509858ff0058f4d81ba116712f479e09c185b13eae9d029031af043cbbb3bbb6187a35a5a624e0d1eba3
-
Filesize
16KB
MD5d9cf75fdd1c2292d986f6c3d5d60f2c8
SHA107ecb1d3a26d952ae5fecf54f36699ab498510b1
SHA2562d227e9b7a044c8e10294f6a831fb92d81ea9582381796d87f35bd268e37538a
SHA512442c96e4b4c79b8d1c64dd3a6d6088ae1dace441e78d830dfb3190ee1c0fafebc606fb432071b4a1ad1a4ba9b68c7877b0bce520ccc88708feaf82bbc474e0cb
-
Filesize
8KB
MD50101026304154ee344390936b3a4b66a
SHA1257e70ac17b62f76638245702702b5bf8f4d407b
SHA256c28998bd28d094d443df0f2c3c000e8891afa1d4bdc4133f400ceebcd559b47c
SHA5124669bef50e70d531173f5f90ebcfe1ef0401a407c164c9566a60e1d3c5d55edb692b4416acf0e1c2898db50c9c2032ee2fc5e487cda22bd66aab969e4ccad466
-
Filesize
512B
MD5b9ba840ebd4978bd59129e88a4e205b2
SHA1978b1472f72f813d937a8fffbc5dc949b66a5448
SHA256599a7a2cef1ce2810084c3884dea33afc6ef01268d743309df7a120e7199491b
SHA512f8fd0d877aac68d7d8333268b0db345290165acfea391c2c676ace38e78a6115c9ff092e14b4a5543a77ad8bfa49818f58dd33feb33bb51a3285c8e7ad152d6a
-
Filesize
8KB
MD5f370ade1ff898f0f4a08e136e3497c0a
SHA17046f125c6aa858def0be6648a7b485a08497dbd
SHA256a47e6125c4c2d2b24f9a93ed6667fcd717a4287955403d480ce9c4fea8c0f497
SHA512962d24a99ef22e9fa8bf36fb7927d4a6b986736bff0ec0d646f4c074da39bf717a712edf6386fff7d887787c37971bcdaa6f49a4c51ad6c2097b2476b3829fdf
-
Filesize
4KB
MD5d1be9300a71798769e1ca5b0fd6bcd4d
SHA1c36009a8829fec800d8e4dff8ca7a17c80716b82
SHA2561ca3eaab2514bbf07ee1e202e8d77e7b79578e310fcff7574d1ea40f2e51a3a2
SHA512159a8d3782735c157c63b0255e431a0fdca6131aad0520753dff1a7fefd3c8289f3234a4c6995d57b74403e6e4335e0902afdf81e4abe4ae9ad4bf825c4ad595
-
Filesize
8KB
MD5913c374053c383c3c8c4951f48fe6f86
SHA1596e66cbd49ba4c6981638ee14bbc8d7d6f6f781
SHA256e0169ee7f94a127426213a1462163a2b575082a312f6095b8cd3d6bbdb0d24a4
SHA51224de09ec00256059dcee260ae098c0b130d5d04d6c5cb28b74f3f308bd4bdfb8516627acadd216ece6d1d7ef68947561ca6b08420f35c62e45e470675701db8c
-
Filesize
8KB
MD516e9d961d32a62da382785c11c879107
SHA112d6a4ba80d10fd544750a71e42ba2cb87cabeef
SHA25691ec3d2219ac205a64b505f2d648dd080e6708197f94a69e960f22ce2933fef8
SHA512f1843ebbb53ecdd538a9cb65712fcde1bb26c6a7ae74e2551f5f5a116ac2a18c69d407df4400a9e5f197ddfad5b8f74e2915fc2f1fbb889bfc4a99ab8e722a82
-
Filesize
153B
MD565026ee778e1372d9f4aed742772e893
SHA15a5f1c821d7639424f3c75a44468ab5f7dd4e8cc
SHA25615070f52136d5a8332f8d70f790bd7bb04cd6a99b386d40e0abedc40c42caa3c
SHA512589c4a12c6b6ec1a1cca957da758aaa900e68a23b4bc2f42524b0e8dd34f6c5378541d9293eae1ae8d478bf5b5229ce4218c058fc3b399eb5756afeb05c68616
-
Filesize
63B
MD5c0523a2edcc508da0751535a4319f08c
SHA155acaa6cfd0a977b297d238ca9616947b1541efc
SHA2564bcb684d7786082a79c167f2c562c271fa68c04692a344f72102eb970c92a9f3
SHA51255317b20b1c27430c543e81d946741405922cdfaf0fe3341af1da6bcd6707c7c6775ee3a943851774a8e302658557380c590612b46b9569575e1087548bd955d