Analysis
-
max time kernel
121s -
max time network
128s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
28/03/2025, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
Internet Ilimitado Gratis.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
Internet Ilimitado Gratis.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
Internet Ilimitado Gratis.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
Internet Ilimitado Gratis.apk
-
Size
1.4MB
-
MD5
1b7c4403eb47f39e041c28de1c21858a
-
SHA1
8ab1e8c4a904f92d5aec4880c5a4bc38e0102abf
-
SHA256
153d5d69a3c27d3eb0b8e1de51a178895cd8eb56dcf0dd8b87caee6a917b3e93
-
SHA512
26513859ffe9d5b929dbbedaf413ee20c948c2f2462127bc811b0942c549106f6ddf7eec7634608f7d51fd4d5bfa650c2aa2028fa36c26b481527e6c9db73381
-
SSDEEP
24576:8yIzSBTPtLiLe3r7JpOdTlhPS+dVlQ6c9S3MyZnNOVoGGwulP8d4AXG4h:86r5i63rnSlM+dVlV2GnNOVYls4AW4h
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 8 IoCs
ioc Process /data/local/bin/su internet.ilimitado.fresa /system/bin/su internet.ilimitado.fresa /system/bin/failsafe/su internet.ilimitado.fresa /data/local/su internet.ilimitado.fresa /data/local/xbin/su internet.ilimitado.fresa /sbin/su internet.ilimitado.fresa /system/sd/xbin/su internet.ilimitado.fresa /system/xbin/su internet.ilimitado.fresa -
Checks known Qemu pipes. 1 TTPs 2 IoCs
Checks for known pipes used by the Android emulator to communicate with the host.
ioc Process /dev/socket/qemud internet.ilimitado.fresa /dev/qemu_pipe internet.ilimitado.fresa -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener internet.ilimitado.fresa -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses internet.ilimitado.fresa -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo internet.ilimitado.fresa -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone internet.ilimitado.fresa -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver internet.ilimitado.fresa -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule internet.ilimitado.fresa -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo internet.ilimitado.fresa -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo internet.ilimitado.fresa
Processes
-
internet.ilimitado.fresa1⤵
- Checks if the Android device is rooted.
- Checks known Qemu pipes.
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:5096
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD587e850af6520711404f9fc591bd21c0a
SHA1b2748569334f6a7192e73a6be1ce95900f861c49
SHA256f523391b76b083944eb489615bfd185e0c859a8c82401f498da1f60641864e09
SHA5122a229829825ff092f634fdf368aac773823934fb4e64b5c23a9b3da36dd91cd9a61d4484dabf215580980370c52957d1023a6d114349202db51865d65898291b
-
Filesize
512B
MD5b138ea587c287815a07da09cc85ca6f2
SHA1506724acff4d2971a61fcc793afb19ae1543fb50
SHA25609b8532c0311e41a128b1301540b0a2e37af4f5a1e904befae002e52cef4f855
SHA512c1e749aa480d97cdbd11a5f5d6e408b0ebf766d5f99290fb0997258d001370126a9dc17bec4533418eb6918c6446ab02152156b1a0edbe21b2691fce59a02cf9
-
Filesize
8KB
MD5c68303b78ca032dc050e32a9a2076ebc
SHA14225a4be2c4709b20f2fcaf51b6e6f6877840a9d
SHA2569c6ac42184d3a5679b523ad676886ac5ce6b92550a63ca6c6c354ef3cca5a743
SHA51250464aad3bf441d055505f974eb9cd7262c34931e82aa3a3906ccc7ccda59e2993b9afb68449ac024656c1eb1fbe23606323fe2d36722ec71d9e1dda136a1459
-
Filesize
8KB
MD53557dc15b4fd1578b565374448a5a64b
SHA1ad08bca9e9ad060dae888acda6548159a53912c2
SHA256a715a366cd8f09bf36fc5e9bfb5bb09b3113038022481ff44d0011d1a140127a
SHA512ea2cb03df146254a4c4a9961dbb658867ecbbde5c724aa0e1a4b61a79ee85f66274e0cc6f464413598a563ccf9d8149b745fcbd8d7b31bca2ff998d223d2133b
-
Filesize
8KB
MD5992dd89e8c40babc6f72667eb4367a5b
SHA1344c88eb54294591cb5e86ea5acb1766baaa0552
SHA256a5305d4f113f098c7908922b479b7d364645b9fece9c67504db6977eb9bd52d8
SHA51261bc090a28a083e73f0a64e9d95eda01f51c5482c6c7cb0343cf29316adcbe3cf879e62c5cbd7b1e2762a6577f8752bb5323d7ba9fbea4a128343fd5ac8daba0
-
Filesize
8KB
MD5baa91b449f0d4c8884c46c3170a74cf6
SHA1924dcc37d60a4d64808ec4a23ad39759c58bc6cf
SHA25673ebe569e95aeda4b0f7c390e8b5ba11d40f9a5e500e9a2b81260d1184267bf2
SHA51218c48b395f67554e8a38ea8eb72f552843c0a4b845c75bde898e6a4b059142c2f7ae832debd9491cfc951089c20f229f654604ffca6d934ae0ad5bd055a2b8ae
-
Filesize
8KB
MD54654dee5ab0b4fdcda5ea459b699a940
SHA13c580f060fc1e218cd360a2bafd9c641a9323493
SHA256a4b10de6216617f0de349db9c17f80b1f90738bca4605ebf5ed52f1f9235db61
SHA512bdcf98900b12105131805da2e507931b7cbe2b8607f66120eb8891306f7bb073d4aa6dfac6589cc83696c67d9e4d28331184e02fa7f731f2b1a6f2d6deb1c44e
-
Filesize
5B
MD59dcf2a6f12095ecff342e9fa0c5ca72f
SHA1c815f34691be353caa9de93bbdb00a31f62a9ed3
SHA2564e68143408826326220a32d6bff59e1cca3dd85f74b018aebd6723c5686c54e5
SHA5127ba3449f5ec3363bbee33d47abe471286cf78034dd70379fa4d0de5fd59215e8c58287eddffed1b9c3c74e157f6a9ad69b0c551001a62d04790bba49df48231c