Analysis
-
max time kernel
71s -
max time network
151s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
28/03/2025, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
91494ac3740da51f0715ef2c9d40d975c367ad4dd52d27cc0e8a0151571b0072.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
91494ac3740da51f0715ef2c9d40d975c367ad4dd52d27cc0e8a0151571b0072.apk
-
Size
1.2MB
-
MD5
52118a9caf8c636aa12403c2a3375a0b
-
SHA1
f479c915f44793d80e0ea5174692415f22db901f
-
SHA256
91494ac3740da51f0715ef2c9d40d975c367ad4dd52d27cc0e8a0151571b0072
-
SHA512
5c614cb5d69631900049c806c4c3fda7ebdf420dbe71e63d6d97f7b748f0f43e8da8202a96f4f9b18c0d60294c517748e435fbc04f0de354380bde2f62caa13e
-
SSDEEP
24576:pFtCeaFt0AsrmaobBeWI67vT4m51+WtE0jI:pFtCQrEQWIxJWu0jI
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.rasugames.pls/app_com.rasugames.pls.YYYYbaseGGGG.YYYYBaseApplicationGGGG/newobfs/0.pobfs 4504 com.rasugames.pls -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.rasugames.pls -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.rasugames.pls -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.rasugames.pls
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.rasugames.pls/app_com.rasugames.pls.YYYYbaseGGGG.YYYYBaseApplicationGGGG/newobfs/0.pobfs
Filesize1.0MB
MD5345d75e49ee764ba2fbfe62da7e52135
SHA19038a0429eaaf4320188b83d19846da1f6fe23ea
SHA25658be2012978d591e91f405958df0ec204a10e72c8e9438b42bce172025b8f222
SHA512e1d02c3e14acbc839843d20ba8ce0c6abed7f402b0963f541d8b1c41a50e8e0f56444666c409c51df5940d64114707e974f6f1c55d03488cffbdff918383ef59
-
Filesize
130B
MD5b38b86f40ad560e2d824b2bf52e2ce7a
SHA194ce3d3bd1653ff8150f46c9256bad311a80de02
SHA2568008cf46b1936977cdbdbfcb90f55227374527b6f91c1cf1437cd440eda20c3e
SHA51286aa3c4e5fdd75d88c66ce31b5ec796f15245c64793ffbfee360338b949c116fc5df3286a4c19601da10506a237a7ea7ee5728c9e33917c40be6419a3d21fae2