Analysis
-
max time kernel
22s -
max time network
161s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
28/03/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7.apk
-
Size
2.1MB
-
MD5
95564f880a4dc204efa01fb847ef5098
-
SHA1
0cb00494f1b1e2fbc7123b0e0ccdc10d96bfb302
-
SHA256
d244984f3db507c88731aa6b953fa56a72e832e1ccc0c715d12e4374e63ba2b7
-
SHA512
79a5254aba019d2e45e69b44dae60f3f4d39ccf104a47eaa1946910f8a1708b3b9f242e0638f53fd4eba1542518dd41356a96d0c6baa57dfdb6371e139bc266a
-
SSDEEP
49152:2Q8QajoyIakKl9pPwcxDRCv7Ji9WtN8dVfbnnbbVbR/rTZ5LIGdG:2Q8Y4lgcuvtiuUfbnbb1lrTZ5LtdG
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5158f954c69da80e81fd1042ad6595b45
SHA14fc704936b7091fd4696c45a8b0e005a32d889eb
SHA256232c09168c23baa45dfe7a30d36990642fb55f4650e197edeb7607317b2948f4
SHA512abd8a9ed615be882dbcedc73743a72ced5ff22b2e95e6e66dc7bcd22ebb220fb5501dafbd99c13bfb4c2feb4b3ee8cf884e20efe139f15c3ae4301fd7e0dc7a7
-
Filesize
1KB
MD590afee09722a443d63e4c9c5c66b2fab
SHA139a8d0e9b5f830505e49919001419df9b9adcdcd
SHA25668a65424560d8f64d38a083e4213f59420b6ec54b194cadd840c5de453efeaba
SHA5129d09f63ab6ab67ec3c643d66c5422a8e7aeda5b7cd8fe18dea24749f21128e251c311b60ef975f61490cd2456357e127b2d4796954d7c7425a01cc2f4593804b