Analysis
-
max time kernel
86s -
max time network
162s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
27/03/2025, 22:01
Behavioral task
behavioral1
Sample
eef734dac634e7f5b69f1ab4bda8b7526fab7149900f36518beaec97e067a61e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
eef734dac634e7f5b69f1ab4bda8b7526fab7149900f36518beaec97e067a61e.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
eef734dac634e7f5b69f1ab4bda8b7526fab7149900f36518beaec97e067a61e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
eef734dac634e7f5b69f1ab4bda8b7526fab7149900f36518beaec97e067a61e.apk
-
Size
2.3MB
-
MD5
e9d7d5b922108818a39b97499f8ff279
-
SHA1
da8119e038c4c7625204fc926496f5986407512d
-
SHA256
eef734dac634e7f5b69f1ab4bda8b7526fab7149900f36518beaec97e067a61e
-
SHA512
f6ffdfa4d9214decfcec0059518479e63326526b095cfd828ccab48346232c9b465c8d50fc28ffc2fcbd30bbc18de0da6597834dd71014b01beb3421acada320
-
SSDEEP
49152:2WDRvFm7nFl4Uk2agh1Y+ijuzdK3fC6/YdW4g1Z31RN:5DRdUFIgh16izdKq6/vZ31RN
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.google.samples.apps.nowinandroid -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.google.samples.apps.nowinandroid -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.google.samples.apps.nowinandroid
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.google.samples.apps.nowinandroid/files/profileinstaller_profileWrittenFor_lastUpdateTime.dat
Filesize8B
MD56a96b28deb21be0d096867d5a1d392a6
SHA1a6a2736bbc70f99860c52009a7e57d8b185d6357
SHA2564c70a2df3adc299b18f65fe8dbf0a6d165df217ae39cae9f7eb8e31f8d3a3646
SHA512966a04e8e38b02442eee1b6a38fd4faedbc5feff8bcb5be6faaa3e0ace9c429c56e8af0b9a2ecc314a6308dff8406bb2d8ef3b96d9a45ca8a4afec496aae96b3
-
Filesize
1KB
MD56b6c1663ef3516b9880b84f91fb32e1e
SHA142de77d1e883cf35b2b00c3e99e17d0750fd1e3c
SHA256877bd3fc96d3c3096c5e070ccea8a7b99219a1f030fa1e88e9addcb87effe49d
SHA51253584b28ac5f20c19bac83757ebddaef2c6c2880d623aa99fe9a412ded099815cf5864cc52fc88e7ad4b5df6788dabd1be7cfcccd0650878765e726620a62773
-
Filesize
2KB
MD555e594929c0a9f98feb97d35851a905d
SHA1430cd734aee081921dba1bd29e77eaf1e6e0f95d
SHA2567413ea11ae4e832bec7d9f8508bd4729cca443bfe013b1eded98267048e820dc
SHA51223f829cce8f4aaf0b95c246a184c0cae9e7c3704dcb6c5f7d6f33521d3fb6d4064dcef3eea503d762b83b825cf47799a551dd35f94ee7775af07981fe6cf4e4b