Analysis
-
max time kernel
125s -
max time network
159s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
28/03/2025, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43.apk
-
Size
2.2MB
-
MD5
165073f9f00a2a64b4a1aa047ed7c73d
-
SHA1
1f98907f709bdc61819b520ec74c0f3ca2493dd7
-
SHA256
5f9f1bb934cf07936124f5cf7b39ae21486e2d1b0db735440c0427ee21899b43
-
SHA512
05d4480145a9a6fb48b85766381087fcaa45ec4f459097f3a9c27fbc8b389565d2dce548bff37bd18ca77a70e9e6e72b36663b35ec2745dfe66076e1e847778d
-
SSDEEP
49152:DDVfbnnbbVbR/rTZ5LIxwcxDRCv7Ji9WtN8Vz9pWcRQBc1sbTdC:Dpfbnbb1lrTZ5LVcuvtiuIeGQ21kdC
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD560cfd549e72afe3e06dd0b0ca03cf4fb
SHA17aa135e5e683ba6683f6dfb3b88d9b1e5edc1f9b
SHA2563a3c3a796c891e9b03afeef9b9e25bc5bddbf9e84a972119f02dbb8472f770af
SHA51296358fd118e38ac4e62c9c95c772cb6a3da2830c742c2cadf7894011631eae8db48e0a9915b867b42014adbc572172382e31f4944d2dd1a34780b04ca543ef43
-
Filesize
1KB
MD5d9b9494710fdfb3cad389e18bdac7f23
SHA14410b9971acf107c4c7d0222619e663e373335c1
SHA2563afb1964315c33683192d148161092f5c852ee4cce0890e3f1db062376245863
SHA5128bd7d975dce86347b9a5afea7f75b742b19ec00c57d288f59762bcbd3f9573a1dca76c09419c2fe2b31fcff06303cf66024283f0a9703733b20836abd5026fce