Analysis
-
max time kernel
24s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
28/03/2025, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
16b95094844c9ac015ce84f248f7b6035576f58a0954d8f95c9e97143bf90f84.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
16b95094844c9ac015ce84f248f7b6035576f58a0954d8f95c9e97143bf90f84.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
16b95094844c9ac015ce84f248f7b6035576f58a0954d8f95c9e97143bf90f84.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
16b95094844c9ac015ce84f248f7b6035576f58a0954d8f95c9e97143bf90f84.apk
-
Size
2.2MB
-
MD5
aa4d8fb468e45229d83a26dc1d4c8703
-
SHA1
d9004f2cd953f28e68b847858dd04eb351cd4f51
-
SHA256
16b95094844c9ac015ce84f248f7b6035576f58a0954d8f95c9e97143bf90f84
-
SHA512
1979106bd7aea593d4c7b5d7234a87e81531d45db242e4cd661abea9d625c419a147a1f316b6241a8e4c65dcec17c64d401e463558b2f9b6313240f8c0850b72
-
SSDEEP
49152:NKVfbnnbbVbR/rTZ5LI6ONwcxDRCv7Ji9WtN89z9pf/Y8HejFdP:NWfbnbb1lrTZ5Lqacuvtiug/YvjFdP
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.application -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.example.application -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.example.application
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD5910452ae1ad5ef02d45ae6250858bc9f
SHA180063c3400dfc8ad590a212c68b99beeae64c546
SHA256e612aec936cd3adb3b5c9f0456892d75e362a2a6d9c7cde62c4ccd67374e0f8a
SHA512a66ac792de4dfe34b178a9cbdfc22c3affa76b8bd0a84d68d1f4e95e55f782db6627b02707c80f6033ed4bb674217ff55a4922fa9f429f1e035333a0df6a99f6
-
Filesize
1KB
MD51bc8aa036ac98e088b9d047135b84240
SHA112fb95a97ba6d52231ed33de4dd48c24c6d4f7a2
SHA256a502eeeebfc5a83b83b7804338a9dc9f0a3901f01858eb01ce2abdae5102249e
SHA512d0ffcf2330a474ece0610b570fa818ab3ec7723cc7fc4f9c4144c309dede3888107000e5f31127da961b1e8d8a69b0c084b95cd4cfda11a653bb282819f4a40e