Analysis
-
max time kernel
18s -
max time network
155s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
28/03/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47.apk
-
Size
2.2MB
-
MD5
de3b0612b47cae8d9cec4c5a1dd551e4
-
SHA1
777feb672f3f0bc20816211cf5cde82ec6a9ffc4
-
SHA256
e93b2b8f0c6d126782300484f15c5a8759043d29ebaaf50dfc30f93041ec4e47
-
SHA512
4767dd44bf049a98d5863f00ca2a7e05a73180f531b3dc8274eb6ddcc943feeff071a5ffbb82cf2ce2a93fbfc4be35f0223e0bc57ee8aba226115d066eeb7cdc
-
SSDEEP
49152:f9VfbnnbbVbR/rTZ5LIWEfQeHuwcxDRCv7Ji9WtN8Vz9pWcRQBc1sbTda:frfbnbb1lrTZ5L6fxHfcuvtiuIeGQ21n
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5508809c5601761d29d9b6860a6aa2cd4
SHA18c8ffafd7c9becbe1501b7f3bbddef3572490e14
SHA2569c8ae4ca60bb5246d7b5ba580ebde949920f82bc364e43202f4230d02ebdd526
SHA5128b44152daa514af7c110dbb3281e4c6534dd6425bbe4b36a614df1778c5c8def3bf7a8d8bed0866ef55bfed2bfdb29d8418174b2fab35f744e5cb360ee4749a1
-
Filesize
1KB
MD5d9b9494710fdfb3cad389e18bdac7f23
SHA14410b9971acf107c4c7d0222619e663e373335c1
SHA2563afb1964315c33683192d148161092f5c852ee4cce0890e3f1db062376245863
SHA5128bd7d975dce86347b9a5afea7f75b742b19ec00c57d288f59762bcbd3f9573a1dca76c09419c2fe2b31fcff06303cf66024283f0a9703733b20836abd5026fce