Analysis
-
max time kernel
3s -
max time network
151s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
29-06-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
c8978e17ee35bb4741c7d2a55ee63dd54161ec8303e105d93c569b24d2e04ad6.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c8978e17ee35bb4741c7d2a55ee63dd54161ec8303e105d93c569b24d2e04ad6.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c8978e17ee35bb4741c7d2a55ee63dd54161ec8303e105d93c569b24d2e04ad6.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
c8978e17ee35bb4741c7d2a55ee63dd54161ec8303e105d93c569b24d2e04ad6.apk
-
Size
1.8MB
-
MD5
c2ffb42a40839129337740c5167bfb6c
-
SHA1
bb21ab065c7a51ad8e9baf6d9308fec05794d07a
-
SHA256
c8978e17ee35bb4741c7d2a55ee63dd54161ec8303e105d93c569b24d2e04ad6
-
SHA512
46196415ed014b1fc002868b5ed533cf277380b44e4269b31153ddc161d9bbff07fadeb0f5dddf08da3b767aa06bdc629f609f66b2dc974eee4872c7b4d747af
-
SSDEEP
24576:OJxRtDHmIeKulYuVG3GgcwRMRrYgWFAd2ofreoPpvWktwe:QxRVHx2YAG3Ggc2gWqd2ofreCWG9
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
jr.js.jtdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone jr.js.jt -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
jr.js.jtdescription ioc process Framework service call android.app.IActivityManager.registerReceiver jr.js.jt -
Checks memory information 2 TTPs 1 IoCs