Analysis
-
max time kernel
46s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
28/03/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47.apk
-
Size
2.2MB
-
MD5
de3b0612b47cae8d9cec4c5a1dd551e4
-
SHA1
777feb672f3f0bc20816211cf5cde82ec6a9ffc4
-
SHA256
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47
-
SHA512
4767dd44bf049a98d5863f00ca2a7e05a73180f531b3dc8274eb6ddcc943feeff071a5ffbb82cf2ce2a93fbfc4be35f0223e0bc57ee8aba226115d066eeb7cdc
-
SSDEEP
49152:f9VfbnnbbVbR/rTZ5LIWEfQeHuwcxDRCv7Ji9WtN8Vz9pWcRQBc1sbTda:frfbnbb1lrTZ5L6fxHfcuvtiuIeGQ21n
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.application -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5fe33d6e6fea609618a159f6e59191e65
SHA1f3b22b6275064549c1b218333c4aa8e79da5e50d
SHA25690530f20ee3ac588611f5c3d7bc12621474d76c5f3b02071422b426c111131c8
SHA51203970e4e518705541f6bb1130ff85910adbe48369cd5bcfcb50da6d6806ea8d5b82823a5de1e5a900845815e38a6da78f230b9a9e023a2e0630421245c65c827
-
Filesize
8B
MD544b6c51d470df8436113892b45ea67f2
SHA1fec5f97548a4dbae29608fe5bcf0a63be1468c88
SHA25677ad06f53faf11de92b1255fac0fded82ceb4ea7e79093bd948b58c43bd1e02f
SHA512faaa169bb8e8d13b83cd62c989bbc999070d443bf4e41c6c0de19a27bb4cb3b14992effac35fd180eabaecc0a71dea780297e805eddd408ebb7addb55c939195
-
Filesize
1KB
MD5d9b9494710fdfb3cad389e18bdac7f23
SHA14410b9971acf107c4c7d0222619e663e373335c1
SHA2563afb1964315c33683192d148161092f5c852ee4cce0890e3f1db062376245863
SHA5128bd7d975dce86347b9a5afea7f75b742b19ec00c57d288f59762bcbd3f9573a1dca76c09419c2fe2b31fcff06303cf66024283f0a9703733b20836abd5026fce
-
Filesize
3KB
MD5857981bf59acfeee75fdd503e9007fc6
SHA1abb30c05c0f8a5055cd3d3539f9d5fb6039065f3
SHA2561763f3bc43d66d645e4a254cbe2ac0cd98bca61c7003a663fdf1521df73fc051
SHA5120ae81224636341867b83ba2ab5380d5fa2a67f691b70a70e5229e910d939b3666ee8e707b5d50ce71ee4a55ad8bf2589cec252cf82d457dc6c8fd747996fdb32