Analysis
-
max time kernel
120s -
max time network
158s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
27/03/2025, 22:00
Behavioral task
behavioral1
Sample
7c1682ac90c1da712af1959f84079facb5d14d05a9d1a92a51cfab1e93f94943.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7c1682ac90c1da712af1959f84079facb5d14d05a9d1a92a51cfab1e93f94943.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7c1682ac90c1da712af1959f84079facb5d14d05a9d1a92a51cfab1e93f94943.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
7c1682ac90c1da712af1959f84079facb5d14d05a9d1a92a51cfab1e93f94943.apk
-
Size
2.3MB
-
MD5
84d8e020aee56146ff98ae92b62f6326
-
SHA1
cf17ff64e93e60d44c149ba955365849e132e105
-
SHA256
7c1682ac90c1da712af1959f84079facb5d14d05a9d1a92a51cfab1e93f94943
-
SHA512
e69ae4eedd31a0265ccb68ab22ae25ec63c6b2e5be827bd2d92cef8c669a94f997799ce16d2ce1ea5b92c31316998274a7585264c170ad76b63a8357253b1acb
-
SSDEEP
49152:4G7Rwo07MVXEjds/E3infX50Tanuzdu3fC6/YdW4g1Z31Rj:dc7uXEJEESnf+T/zduq6/vZ31Rj
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.google.samples.apps.nowinandroid -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.google.samples.apps.nowinandroid -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.google.samples.apps.nowinandroid
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.google.samples.apps.nowinandroid/files/profileinstaller_profileWrittenFor_lastUpdateTime.dat
Filesize8B
MD564aad79ca52c4e97ef5945eb823dbcdf
SHA143d1ca7c41a1b347af971be5e6335fce29deba26
SHA256b1738bc53a82c21de35f93e3467f9c3c4fcbd2864a1bdacd7d2d827dfac4e1c2
SHA51219b8306b2b7a05f370f5770cefd4c808c08e5dd707884294ae12bd987485534c498a8560913a8f0508a622daf871b4697250b05ee18d6a5524294178c48c472e
-
Filesize
1KB
MD5b195e246d489e606b50789ccc9c05279
SHA1b27903216d362d89a3d76ff6cc00166107c21d94
SHA2569f8d1deec3912a2a65a50747fde2b691f18cfbe97e08b2d5822f806afa6c6235
SHA512be6a63d40c225fa103f7b10dc830fe5006c56afabf02cd248a2890b99f52b5b07aa30430826f357744d9815b5da0a70eb798f525fa267b59d0455f0549d09aa1
-
Filesize
2KB
MD56c2d7126222d3e1b2cc97b6794c1a059
SHA151e34c36aff4339fab1673b65f713b5f3113a47b
SHA25607d3ef48d2ea8da46887117da0da3a8cea1a248ae851a26097a0c7979ec8d5a4
SHA512d41787afeea10001f56e813331c7d638780fd4ce285b66cb8b5dff81c235eeb9138bbdfdf0be55809cac9b7c215e806ef2c2303a89d6ff6991fea4f66e41a1b1