Analysis

  • max time kernel
    5s
  • max time network
    183s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    29-06-2024 22:10

General

  • Target

    9de7db282d805904548c2663a7f8105defda2c5d300216e7ca4baa71d8309384.apk

  • Size

    3.3MB

  • MD5

    37fc3edc7d289f5dec9c8a6fd823fed3

  • SHA1

    c3eb6c7e8056272f72adcb66e4541750f5617511

  • SHA256

    9de7db282d805904548c2663a7f8105defda2c5d300216e7ca4baa71d8309384

  • SHA512

    414bfbf8c19a49090dac582105e470ea50043cffc5eec486124c3e9cd7e4c69751a358beb7a4c86a7abf5c2c28f772b717234df3a2851ccfe91f74b732d01a89

  • SSDEEP

    49152:zFAMtkJhxv1i723GgczNBbJYAwBuoji+bU9A4Lr0iTr9ZwWgWqd2ofreCWz5:zoXv1iqG9v1YAkuQfaA4nl4zd2ofreCK

Malware Config

Signatures

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • jr.js.jt
    1⤵
    • Obtains sensitive information copied to the device clipboard
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks memory information
    PID:4650

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads