Analysis
-
max time kernel
123s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
28/03/2025, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a.apk
-
Size
3.9MB
-
MD5
7c8b3c00973ca3958f4e41e8950cce35
-
SHA1
824a227d09917582c8ecf5594b62454931fdba22
-
SHA256
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a
-
SHA512
73b980b63bbdb97388cff1220deecfb507d903cda89ed3cde99a3f0a3dab67f49e43ae5ccb16642d0c33dc7eef99ddbd3f150f173b8cc9a1acbc7105b363a13b
-
SSDEEP
98304:2fZi2qb/g2nKAPQthA8Cm0IkxOLN9g2/Lo2PZtceey:s4h4j2l8SYY9E
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/app/Superuser.apk com.GjIZIJIz -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.GjIZIJIz -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.GjIZIJIz -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.GjIZIJIz -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.GjIZIJIz -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.GjIZIJIz -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.GjIZIJIz
Processes
-
com.GjIZIJIz1⤵
- Checks if the Android device is rooted.
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Queries information about active data network
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4622
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD508a63c618272902cdf012e94b32670d4
SHA10e4cafbdccb3a994a0e9ad388c00731c3ec328e8
SHA2567ea072bdec5a188e32fc98a57ad3ca924f2fe65c986c80012606e91e34d62c5f
SHA51268a28be5ae3bca29bc5c866871c0389003bb0362bdc7d1142e171dbcea3933a2ca441854f25268e8b512d27185101243199fc46e4d69907be8d0aa790be2d829
-
Filesize
56B
MD58b94442bbdafa818d90d3d965f7e1dcd
SHA17b54e3b2452e37ccfa2ba18d9546c21b031b9e12
SHA256b228011228db04ee2093053a955cc518c29ef9b8d06596ef990e3efdfd1af519
SHA512cc1d4544320574d4cd999743a154d6688a5b6ffea8c69308a16d8fe3d49c0bfde10a48a39ea9f4db98204bdb955fa18c3cb0ddb46ac5e43de0c5b82c91d127af
-
Filesize
84B
MD587d730c042436581d72d91b04a14c1b0
SHA1fe7df1a04aec8512a11949ee422743f28d7d66e5
SHA2567e12b3fd0aa884cfb6a0a7213166707edb997fa2f8ac402bb07d85fb135a82e3
SHA512feac56e94890d3b5859b3703072e612b514cb8c8972fa8fddd63db2c3263b3afa16df1c64e9fd2d263c87315c30ca12475f6f5393d68f1ef278d2e7a3e9c9ccc
-
/data/user/0/com.GjIZIJIz/files/stateless/dW1weF9pbnRlcm5hbA== /dW1weF9pbnRlcm5hbF8xNzQzMTk5ODQ0MTI1
Filesize1KB
MD51bb0be1ee3f84e02bda8ce179b961ffd
SHA1e3008e0dd09ee5fd615e1ced1f607e1076c48faa
SHA2560b2fb0f2fcb3a7d0dce0b21b95ebc2ca4f7c39926cfb316245a19604774b4acf
SHA512611fb7bbca4b0129208f1b59ee7ad197256975cc1073aebd9b85c826d3dbfdbc0c642b6a2a7ed5964732fb6d4ebc196ed15409427ea892522d0ede29cb48067b
-
Filesize
350B
MD5bc0dadb93fdc920315f587e7a7853564
SHA162798c32813355c071ecc6426ec742e4f975773c
SHA256a509b31e585954cc9df95020839e34adb6232d5b30baab7ad2073299633f1593
SHA51299b3d26d49808969552b1e7f7987e29b1ad6a3c8c51c3a1646a11f6d1ea1e61d8296c81a78d247b6fd00c87492353b978fb294a26e8c78790b49175673541412
-
Filesize
5KB
MD5aa0b3696507a4b03b3862a71f695ae93
SHA1dc201e2bcf80ecf383b7f581b22169883b3e0ab5
SHA25665db96887a1a70a951913f871a8bf2b16a11b84290dc1fdfd93a184540e4ebf6
SHA512f662d7bec48a315150d148f9ecb99fec3b4c88fb8d99c18c93a6b651dbf4f43694437aa491880bb0d6321893a6f74890207a00f3592d36c686bdebb4db222ad4