Analysis
-
max time kernel
45s -
max time network
150s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
28/03/2025, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087.apk
-
Size
2.1MB
-
MD5
bad4ad699068d263b86b56acc4060680
-
SHA1
44fea367089f52e798dd2599f51aa09e17221178
-
SHA256
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087
-
SHA512
e3b5a3dac84db6f994df8adadcb4075a69f14b40da19a5ee0963b0845551026c87ba8de7eef9168b0979c17fe1ef5d6b3c4f3eca8d62880bf809c36f22a2b76a
-
SSDEEP
49152:mLx6DKN9pnwcxDRCv7Ji9WtN8WVfbnnbbVbR/rTZ5LI3dv:mLC2Icuvtiutfbnbb1lrTZ5L2dv
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.application -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD594589fabbdaeafd1f92e22eaa6bf1d3c
SHA123d0ad2c3da22d86ab5e39549cfd12cb58fc104d
SHA25607c97a7d0f2359c90d777f05f6636840614288a5c54b20e542d61c1388e92baa
SHA512b5126285b7f3b92284c1f125dcbfe6e767cf70f95b33f7e2823f5d66482758af43b467f804aeb26af848cb4dc83b435f74f37ac12b391a02ce9746b64255f634
-
Filesize
8B
MD544f23a0c6afc8c6ec5ee470e7ceb019a
SHA1d0e142bb4e604a929d8026bde5a433b051cca7ce
SHA25680ac03835a681f9dad7ec51cb23f6313fcac879b6d3369d4fcac3d94e33e734b
SHA5123de089e6d40b6063f1394357dcecd8fbc686d0ef376ca921cc3b89a5091cfeb0930e5cf37789e4fac0a045f90d16527c549468762f60c8d49f3463f66346eefd
-
Filesize
1KB
MD591c9db22162b4c60f1ab6436542c938e
SHA1e5040767e179245b1cd9e38301e3fb685577b2d0
SHA256db4e9b8d27363b9234a130167eda77b78efd51c44bca7ae433ef91dc17c57f6f
SHA5123e1c2c3eada98e5d41891e166010bac611c2106450761be5ea0243eeb5b3b26d855f32b574676acb669764dde53d5d51f2c251b8b648dc98440061b2aed964de
-
Filesize
3KB
MD539c6f4e090ec5e5db53f98fde384de45
SHA14d1d1ea1515687c1afdd791613651f550c460d0a
SHA2564db6e895fe902437fce93c1e747444d11abc5393a2b78f4b4fd4df1a581f5734
SHA5120b16633655b74cd2e021d8242f8afdcf26379bea62bbc5063eb435849da4f68a95a9e89f83cd5463aefd3f9566b1f1a39471429b27c100adb60ea80a8b93d09a