Analysis
-
max time kernel
121s -
max time network
155s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
28/03/2025, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
Internet Ilimitado Gratis.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
Internet Ilimitado Gratis.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
Internet Ilimitado Gratis.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
Internet Ilimitado Gratis.apk
-
Size
1.4MB
-
MD5
1b7c4403eb47f39e041c28de1c21858a
-
SHA1
8ab1e8c4a904f92d5aec4880c5a4bc38e0102abf
-
SHA256
153d5d69a3c27d3eb0b8e1de51a178895cd8eb56dcf0dd8b87caee6a917b3e93
-
SHA512
26513859ffe9d5b929dbbedaf413ee20c948c2f2462127bc811b0942c549106f6ddf7eec7634608f7d51fd4d5bfa650c2aa2028fa36c26b481527e6c9db73381
-
SSDEEP
24576:8yIzSBTPtLiLe3r7JpOdTlhPS+dVlQ6c9S3MyZnNOVoGGwulP8d4AXG4h:86r5i63rnSlM+dVlV2GnNOVYls4AW4h
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 8 IoCs
ioc Process /system/sd/xbin/su internet.ilimitado.fresa /sbin/su internet.ilimitado.fresa /system/bin/su internet.ilimitado.fresa /system/bin/failsafe/su internet.ilimitado.fresa /system/xbin/su internet.ilimitado.fresa /data/local/su internet.ilimitado.fresa /data/local/bin/su internet.ilimitado.fresa /data/local/xbin/su internet.ilimitado.fresa -
Checks known Qemu pipes. 1 TTPs 2 IoCs
Checks for known pipes used by the Android emulator to communicate with the host.
ioc Process /dev/socket/qemud internet.ilimitado.fresa /dev/qemu_pipe internet.ilimitado.fresa -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener internet.ilimitado.fresa -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses internet.ilimitado.fresa -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo internet.ilimitado.fresa -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule internet.ilimitado.fresa -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo internet.ilimitado.fresa -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo internet.ilimitado.fresa
Processes
-
internet.ilimitado.fresa1⤵
- Checks if the Android device is rooted.
- Checks known Qemu pipes.
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Queries information about active data network
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4821
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD595746832e230b00df6243afeb990b897
SHA1ce2795423919a430fb524baae41ed33b62d2bed3
SHA256be31015bcd8f984b9bdf19a2e3fb3961bda207353a739529780f6be195a7c51e
SHA5125ba54471c4f1ce8db4ea4094a721eb4ed0e8e7c43d4ff0d9d6331d7568a2a7a49b43d0082effc746d1757e62bde5a00c9a96c96d58c09f0250d4b3d92fbf274d
-
Filesize
512B
MD5757d2f585e9b6ac42cfccdb1a0e834ba
SHA1da946733a502545ad33c4b9f8f48023836a3d4ec
SHA25669aa0590533f5a2b0bcdd72cb2539114988742a3b924d8fb7b8b17e9c687cb52
SHA51241d2deca73377b384ca835860eb2a90d4eb76ce97b0ba702208017606293f41fff6366e8c1bf2a4bcba63b5be6091db462b9447f9723b7f7aeb54ff89540d60e
-
Filesize
8KB
MD5ef351d681d9a9feb5d5ec988fa5ad67b
SHA1c78af04f67525cdd49f3fde3e200de98967c7531
SHA25669e02b0d9a6e4ac07305d94acef37ffe444ce3f41a5b6155ddaa05f782bf9047
SHA512f3ea1661f257c73ed1adf4ade9f79a6ca075643314ec48dfa0c03db3c97607c4a79dcfaa6c9528fd4d9f80fbeda87e1966f0640e2ab2555eac91a0b3f7f5a6e1
-
Filesize
8KB
MD5d305c125ea04e0c05512b1b612fd6f32
SHA18ba6219b93d1bc8cf2903dc70941858066e78b79
SHA256af29f99819521d755ec49b03578970dd2cf93fe01e49364b36b5413b15c767de
SHA512d3ea83361552bc8a1ceb82c9a162a149e9f5a258b4cd4d0207030570ab6b76076976b0d5d8220b7464074a62af6f39a81954ae4a6634d901cacec6a4985a5719
-
Filesize
8KB
MD5a8dcb2bd157688311196616979d04f79
SHA137bf5618ca1a116e7c85dd5445979059e3c5c70b
SHA2569b8ce1ed8f5910be892aa996af65a6cb997387a28dad7042ecda39f7b203386b
SHA5128eb177878bafeef3f6e150fb420da3af6a6fa5cc8d7d043357f8a6be23599e5832ce2c0c127fe082dcca5a8f25240723190844d55b31679c498abe34f48819e9
-
Filesize
8KB
MD577f0e888ab5a1ece2464013d162e6629
SHA12d0dbb99fe425349335cf21ec1b2dabc1216941e
SHA25683a0f53ed239a64a223051ac3a278fa9e1f106cce97e86c2f215f16f6da5a852
SHA51279230f83f767968d871f76b0d9f51efd8e1d03c91500e2d1467b10e0080e2c04b0a26323f700e729138d4e7468b141dd04d382f459d0ca47ba02b6ddda0bf5d4
-
Filesize
8KB
MD59042842797cb5087a960231ab0b57807
SHA18f3bebf845c04ea8ce92b82467b5117b25c69497
SHA256ee32affed5900311f8bddb0eed107c03fc752c2a686760f339be01615ae4c1cb
SHA512a311987d8fe746cd82ed07a0f3623eb42610d80b8776fb6fa68da432a0ac4e6e89088c6b6a2f7777f88aaf5056065c512dd679f936bcaf5a69c5d8f1ae424f58
-
Filesize
5KB
MD52802c414d94a026277c1060588c971c3
SHA156569f38ea27d740d677e85f2769339f17106c03
SHA2563544d8f526e201697cd71bc84cde7ea675b5ab67c63357fe5204dbba1f44b617
SHA512cb5e3c0d6a8e65202920a45047d7aad9c9df43f562883939b06f1a8686f2b141f4a4009531350001938b037c7f9aa8e2f392e4e24e22743456b808941c7de66b
-
Filesize
1KB
MD5dededa078ed1c4710bfa387ab3fb785b
SHA1704639daae67d8d1695f1d8a0134d28743d4baa8
SHA256e46f1c4b38a62a348bf9b5b6a25643d89b04a469d71f6dbe89f36dec69738fbf
SHA512983c73315d4eb7c95eccabbca39c8c4bc8b49796c2ea3a92a52dc4f124c0d32676558fbf0b50741bc1dfb1d4b0d721a169fce44bf18f76886ffa9014d3752b88
-
Filesize
5B
MD59dcf2a6f12095ecff342e9fa0c5ca72f
SHA1c815f34691be353caa9de93bbdb00a31f62a9ed3
SHA2564e68143408826326220a32d6bff59e1cca3dd85f74b018aebd6723c5686c54e5
SHA5127ba3449f5ec3363bbee33d47abe471286cf78034dd70379fa4d0de5fd59215e8c58287eddffed1b9c3c74e157f6a9ad69b0c551001a62d04790bba49df48231c