Analysis
-
max time kernel
46s -
max time network
152s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
28/03/2025, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e.apk
-
Size
2.2MB
-
MD5
ac915308fd837012e6e009f6bcedb966
-
SHA1
57ade9abc24d2094b0c01129bc7b9f8561261c94
-
SHA256
df0730236595e7f7366a5925c13cbc03f2796d0bb1a9448a4508d2a229f63d9e
-
SHA512
2440529d2ce92ede7c2c3b0fa924b649860e78d11a83768e4f22bdbca12f5ddc2e397f965443bce5c3ee70a0af38519fd88fbc80c90be27683d7a69749586795
-
SSDEEP
49152:O7VfbnnbbVbR/rTZ5LIxC0wcxDRCv7Ji9WtN89z9p8jV6aHw+FgBPd8:Oxfbnbb1lrTZ5LLcuvtiugk9wegdd8
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.application -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5eeaba610bd67238aa46747c5cc164276
SHA1c22b93b081e6531438a7294662cb3a43f905788b
SHA25615940306aeb1fb4529d86e8b230ad3490d4beb4864bde8f8075d598aa0b011e6
SHA5120a5a5bd2112c2a0a28c2bd5392d85d62be999c5ac2d7d99e0714b66716bae45013ec9e26e0cd4597c328289076239760a19ac3eec4e1f8f3939edc0b0ad7ca78
-
Filesize
8B
MD5422fc8c43eafe38b1be619808feac52e
SHA13b56227e267916c77072c285761ee542e43745a0
SHA25600d6e584637a8b33b051b185e0a2369030ad4dcdcc370d5b075cd6399b823df2
SHA5123d0563a001f5dc23aedf6a97e3d952b3ef6588b6b6e4dac9d7346aaf47075c154c8e5b2397f01da3d9f58a42c37a143c39139ce52bbb8e8c062f71789b6983c8
-
Filesize
1KB
MD5d966bfcc7ddd827139c16c3370a12def
SHA178b60147bd3567fe3c6e9ffae15671ccd465e8c3
SHA2566fc227ef47250ada46ea8e28158503c936ddd89f2eb8e4a2aa44ac7cf994be66
SHA512b5eab5577e7f6b5d5d489bf96a3a59ea8d6186c6d7e47c1a960a6085f8c1bde5e0119bc8afd96a348050e18bb05fd5ef2f774d95a33baaf986a58ebd3919c631
-
Filesize
3KB
MD5398eb1995960b6ea73498236d2f21e7d
SHA1f7cb4e590a4e3513990ff6ff30cbcd8775a7f08d
SHA256a3c9fc5fcdc323b0c199551eaf47ecd557dc3103bf609e756775a1c285fd4a3f
SHA51254629950ca89a5e8ee631aba92f8af7736e409ea6b42e17a168b234a12d5c627e27a1914a915e583c5997fd3dcd35b9f2e9b0f08d5b4651773753e1a72acb8b5