Analysis
-
max time kernel
108s -
max time network
159s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
28/03/2025, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087.apk
-
Size
2.1MB
-
MD5
bad4ad699068d263b86b56acc4060680
-
SHA1
44fea367089f52e798dd2599f51aa09e17221178
-
SHA256
07e27601332af7ff5197cea5ebe732b508e092bcd63f560d73b39f1cdecd1087
-
SHA512
e3b5a3dac84db6f994df8adadcb4075a69f14b40da19a5ee0963b0845551026c87ba8de7eef9168b0979c17fe1ef5d6b3c4f3eca8d62880bf809c36f22a2b76a
-
SSDEEP
49152:mLx6DKN9pnwcxDRCv7Ji9WtN8WVfbnnbbVbR/rTZ5LI3dv:mLC2Icuvtiutfbnbb1lrTZ5L2dv
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5d698f72261fe5a29efc0f263bd22239b
SHA14b0c8700266afc8a204442f694ba12d3485ce3f0
SHA256319d61d6e12857f6a1fb09e5cba4d5108769216da76db8269003bd2a1e385123
SHA512ad7beeabdd210430b4fae20dc0586a7bedb10892e2d8be579ceb42767a08763ce25e913fe0ccfbfa0f1f2269fdd75e0e78564f35d9304ed017cfb926728e82b3
-
Filesize
1KB
MD591c9db22162b4c60f1ab6436542c938e
SHA1e5040767e179245b1cd9e38301e3fb685577b2d0
SHA256db4e9b8d27363b9234a130167eda77b78efd51c44bca7ae433ef91dc17c57f6f
SHA5123e1c2c3eada98e5d41891e166010bac611c2106450761be5ea0243eeb5b3b26d855f32b574676acb669764dde53d5d51f2c251b8b648dc98440061b2aed964de