Analysis
-
max time kernel
112s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
27/03/2025, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
4855970aa460909d3e7aa57251a89cd83864900a4ed1c011311c8e87a768b46b.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
haha.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral3
Sample
haha.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral4
Sample
haha.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
haha.apk
-
Size
2.1MB
-
MD5
7513f1e7073f370baaeed7474834599a
-
SHA1
68889c85521d10d27ca31c20b72c4bb3061ab6a0
-
SHA256
baa6ffe5ca25c9d67b4944b8f0049a95adf79284236261ee0a6924def87c677c
-
SHA512
e755a7c98b8753915cab5ae87eaba17f9909972ce20c9ce75de484b5d1cb19568e69aea35306566e149632c0c2d0722df96557cc2c37865590c1af40c29d0148
-
SSDEEP
49152:C3g92A+0sJLNSCZs55W187bbJbG30TVkSD2YE:R+06NSus55WK73A034
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener eri.etzs.wons -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS eri.etzs.wons -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal eri.etzs.wons -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo eri.etzs.wons -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo eri.etzs.wons
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD564899fc9dc9b9bf3eaec572943c2c472
SHA19888636014e12384fce05409c2624994f6702669
SHA2564674d70f945adfdab8f721fe46aa754d7ce43ca4b2481b6e3a25ca45f805bca2
SHA5120ecd2282a0c66591bab29fdbd73bde8196b47e3136acca7eaf182cd63bfcdb98e53f94a0ae4388d0f9ebda89ca1d1ebe5c8950b000b318dd74a0e7272177ae41
-
Filesize
1KB
MD5f161240cd045c531ecb44c32cee4f442
SHA1d71bbc3aca53bd32acf65e3ca6100b8b719e2dc0
SHA256137c0a1d7d809e36dc3b99d5d2ac2e9c76278092ba08c52a65eeea4ad860e11d
SHA5120001b2c19d4c04a822484ae165ef5d3aeae6d1f823b8f2e9a41a709d57d4f399d0b879f2bde58fbb614bc77168ad4c404cdbe2a7808901a179024fec7db9c378
-
Filesize
25B
MD5b9d9e0f8902d129e1aeebff0ae7b725b
SHA1cb0d2b4c9dd60a5c1fc6261fb581bcd3416fe781
SHA25625a822139d06016af8be1296c0242b60e35074f94c713e03323636be1162ce91
SHA512f158a9dc753e0cb41f71a98714ff02198c576bacdd792a6153fdaf6f9a7b52d8cfb6d09099a269d0c1b0d31e2ea5a307ea1db85115bdc6797887a6de36d597f6