Analysis
-
max time kernel
45s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
28/03/2025, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43.apk
-
Size
2.2MB
-
MD5
165073f9f00a2a64b4a1aa047ed7c73d
-
SHA1
1f98907f709bdc61819b520ec74c0f3ca2493dd7
-
SHA256
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43
-
SHA512
05d4480145a9a6fb48b85766381087fcaa45ec4f459097f3a9c27fbc8b389565d2dce548bff37bd18ca77a70e9e6e72b36663b35ec2745dfe66076e1e847778d
-
SSDEEP
49152:DDVfbnnbbVbR/rTZ5LIxwcxDRCv7Ji9WtN8Vz9pWcRQBc1sbTdC:Dpfbnbb1lrTZ5LVcuvtiuIeGQ21kdC
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.application -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD599114b3751d0c48264963de2ce291bdb
SHA1241fe4689b6832bd7db0a7f4552692e658516da4
SHA2568c912cf7f4146a081cffb55aec89a1b9d87baae05d57bec514d511d16bfd6dfb
SHA51231e5046fdea77b8bdbb82cabdcb1276a9fde7308ce784612effa26c6a9238ffeaa30a2bdc152647a40cc45c419e15da963d1c713a91fcfaeddd88e1ce029a272
-
Filesize
8B
MD5e5ce59d40c21adc26660cf5b3dbd925b
SHA131b540ee63a3b3930f91e2c82f9611c5dd63bde8
SHA256672b94f63f722d94e0fec285a1cd13693c52b56be6b0d09bbfd02f4c328f4d4a
SHA512781ac3f70eb98547a357de556772e94957bf91a7b957252e23ba9cb40b89d2671d1bb048fc7ab25c7be78a1b6dc74e4185b4ec36d4a7fe04cf633f30bad5a36f
-
Filesize
1KB
MD5d9b9494710fdfb3cad389e18bdac7f23
SHA14410b9971acf107c4c7d0222619e663e373335c1
SHA2563afb1964315c33683192d148161092f5c852ee4cce0890e3f1db062376245863
SHA5128bd7d975dce86347b9a5afea7f75b742b19ec00c57d288f59762bcbd3f9573a1dca76c09419c2fe2b31fcff06303cf66024283f0a9703733b20836abd5026fce
-
Filesize
3KB
MD5857981bf59acfeee75fdd503e9007fc6
SHA1abb30c05c0f8a5055cd3d3539f9d5fb6039065f3
SHA2561763f3bc43d66d645e4a254cbe2ac0cd98bca61c7003a663fdf1521df73fc051
SHA5120ae81224636341867b83ba2ab5380d5fa2a67f691b70a70e5229e910d939b3666ee8e707b5d50ce71ee4a55ad8bf2589cec252cf82d457dc6c8fd747996fdb32