General
-
Target
LaCuerda_base.apk
-
Size
9.3MB
-
Sample
240426-whjdtaha47
-
MD5
297f8118b999280e3854d3b46a810810
-
SHA1
d3b54ee522793dc1d22e9443f69357e8c1322a66
-
SHA256
6a28f490292da41e37399c561765cf6ea6b613e40a7cc2869160e99039f0d0fc
-
SHA512
244459c97f22cb555a92770751e595c72964dcd89b5ee158198a3af210132b3c732097882980454f838cd0ea1b172e96700e068fabc793f7f59a431efb03124b
-
SSDEEP
196608:BjSMTHpZroblaXBKzrUwKNzRk4+4UQu6mdTQ:BGMbrob8XBKz4nZg9Q
Static task
static1
Behavioral task
behavioral1
Sample
LaCuerda_base.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
LaCuerda_base.apk
-
Size
9.3MB
-
MD5
297f8118b999280e3854d3b46a810810
-
SHA1
d3b54ee522793dc1d22e9443f69357e8c1322a66
-
SHA256
6a28f490292da41e37399c561765cf6ea6b613e40a7cc2869160e99039f0d0fc
-
SHA512
244459c97f22cb555a92770751e595c72964dcd89b5ee158198a3af210132b3c732097882980454f838cd0ea1b172e96700e068fabc793f7f59a431efb03124b
-
SSDEEP
196608:BjSMTHpZroblaXBKzrUwKNzRk4+4UQu6mdTQ:BGMbrob8XBKz4nZg9Q
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks the presence of a debugger
-