Resubmissions
28/07/2024, 20:47
240728-zlc8ratdrr 602/05/2024, 15:10
240502-skfh6ade78 730/04/2024, 13:09
240430-qd1veahd32 730/04/2024, 13:09
240430-qdxgzshd28 630/04/2024, 13:08
240430-qdqdnsfg2y 630/04/2024, 13:02
240430-p9sm8sfe91 730/04/2024, 12:55
240430-p5rv5sha92 730/04/2024, 12:53
240430-p4qlpaha65 730/04/2024, 12:52
240430-p39yyafd5w 630/04/2024, 12:48
240430-p133lsgh95 7General
-
Target
Bomber.apk
-
Size
2.9MB
-
Sample
240430-p4qlpaha65
-
MD5
cbe0a803706b24b6c30491cf28f647d8
-
SHA1
b979843f24a928730b7570d1ee296a968af9f8ae
-
SHA256
e7df0632fe903c7fd9358315068ad1f166305fad956133c385a1246d5889d5e5
-
SHA512
de31b0c489ee5c2f38b2bcdd8da9adf5437bb81ed4ec499fdb64db6ed08e9956ae4264be719da97daabe733f7bab7f7b11330550a2833e6e17e66966049b99a2
-
SSDEEP
49152:S9W/Kdx3aHO8k7fHHj2sOAmEaouOvalyhWj/RQeV42P7mARW0kJzYUz/Cv2BbTCm:S3d5kRk7fHHSAcovoyED3WkyA+Vtzq83
Static task
static1
Behavioral task
behavioral1
Sample
Bomber.apk
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Bomber.apk
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
Bomber.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
Bomber.apk
-
Size
2.9MB
-
MD5
cbe0a803706b24b6c30491cf28f647d8
-
SHA1
b979843f24a928730b7570d1ee296a968af9f8ae
-
SHA256
e7df0632fe903c7fd9358315068ad1f166305fad956133c385a1246d5889d5e5
-
SHA512
de31b0c489ee5c2f38b2bcdd8da9adf5437bb81ed4ec499fdb64db6ed08e9956ae4264be719da97daabe733f7bab7f7b11330550a2833e6e17e66966049b99a2
-
SSDEEP
49152:S9W/Kdx3aHO8k7fHHj2sOAmEaouOvalyhWj/RQeV42P7mARW0kJzYUz/Cv2BbTCm:S3d5kRk7fHHSAcovoyED3WkyA+Vtzq83
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-