Analysis
-
max time kernel
46s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
28/03/2025, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
c08b6d63cc768b018767612e3b60834009d9a56a1c2901758799f28dd2a5ea5c.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
c08b6d63cc768b018767612e3b60834009d9a56a1c2901758799f28dd2a5ea5c.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
c08b6d63cc768b018767612e3b60834009d9a56a1c2901758799f28dd2a5ea5c.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
c08b6d63cc768b018767612e3b60834009d9a56a1c2901758799f28dd2a5ea5c.apk
-
Size
2.3MB
-
MD5
1d271ecbd0d03502326da1f3b998920f
-
SHA1
5e92c377181736183b7aa74d8a00b5120e32c519
-
SHA256
c08b6d63cc768b018767612e3b60834009d9a56a1c2901758799f28dd2a5ea5c
-
SHA512
a5bb13dafadea61f9912466f682eed7914d2e37f88371d7f4b001611971972109fdc5a5f8409bd9046913cf18a4203e68178868c5e40509d52ddb0bee6e20e81
-
SSDEEP
24576:Ynglh4K+pL73/KrdStBQqUYlBwQSnfxA47EnZTF1XEhw8ZKZvzpERRukXYszgdlm:Ynglh3rCBQqCfxdS/UhDOv9I8dI
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener ru.putisha.app -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone ru.putisha.app -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver ru.putisha.app -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo ru.putisha.app -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo ru.putisha.app
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD54a97eb4e17329596e7715632e61e791e
SHA1e162c469a349ba92c3ccadf0178112021fc14e76
SHA2566e8bf862272a015bfcb6b12155324964a3d124aa431409e9dc14ab046427cdb9
SHA5125007c68155f812792fa9bf48e16a07ee7251ca113996effa675a3571e2817c68bb156c4870fae880eb2730c123ff4beba3e5596245539b639d32be0b1634485e
-
Filesize
8B
MD5fd9d945a0a09bb4acac28a4a826e7677
SHA1f7bf6d0e8ce7a512efe5de0a15ef239555f17344
SHA256d52a8e20bcb66935f4ac9b06f93bb2c8b2bd2e23df57c6887a8a6dc102a85689
SHA512881a9288181f375eff5ca2fd81c69f89427dd4c843f35d086826d60a86b742d93db9883b9985cbccec8d42a62452321c2b9aef92f23dc0e3ee7d917faef70d1f
-
Filesize
1KB
MD59929cb8e4ac5fbd2379e25ff7b4ec2c7
SHA1dc529a7149329762b1309aeaebc9ba45de2c45da
SHA25617e9a12a2fcc68cdeca9f93f1bb94794ada2b6c51bec97b0d9715138ab6be794
SHA512dea5f78822b1d3bcab2794993de909072dcb32c42575317eacce0b14a1e7bea2b627b30994cf2970df0ab73dda0356827c557e3b11f8c83f7bac4abebc11e1f0
-
Filesize
1KB
MD549e4575d70bd44f9ed194ac277f0878e
SHA14ea37c334591c8f3e8f42cbf17d23114796f8233
SHA2569ba770a2778bc0d4fe629756ac70a04240e2f14dc2496be4fa36c1d313de49fc
SHA5128b58d54ec72acfa8c4545b80ac8d4390f76507986622a3275a24092f6eabd82a97a348ce299fdfa685f01d6fc7ba148bcc08376e77164a2aee1d39caabf3d72a