General
-
Target
5815a29e5fc062840f4bc9620a8b618a
-
Size
3.9MB
-
Sample
240517-w1sp7scf44
-
MD5
5815a29e5fc062840f4bc9620a8b618a
-
SHA1
8ddf03b7b7e130113b4685ccfa80ba790ba5f847
-
SHA256
cbbbd1a3eae287286ca6d28628d98c78c971964aa4a725c094a2f6ebf1061edc
-
SHA512
3a85344642b91462e6248108dd6fed59f0ea1a7ee222e2d720d79febe4828fc826d3b46d319eb11c1029c6a2e8541b4d608cf1f31db8e7c215015ced2317be89
-
SSDEEP
98304:EikNJQQyLRdnrTPIUL4VfSytWvlNMxNRcXpJ0ADxnIC:jkNS9LPvPDkBelNAcZJPn1
Behavioral task
behavioral1
Sample
5815a29e5fc062840f4bc9620a8b618a.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
5815a29e5fc062840f4bc9620a8b618a.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
5815a29e5fc062840f4bc9620a8b618a.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Extracted
ahmyth
http://193.161.193.99:27229
Targets
-
-
Target
5815a29e5fc062840f4bc9620a8b618a
-
Size
3.9MB
-
MD5
5815a29e5fc062840f4bc9620a8b618a
-
SHA1
8ddf03b7b7e130113b4685ccfa80ba790ba5f847
-
SHA256
cbbbd1a3eae287286ca6d28628d98c78c971964aa4a725c094a2f6ebf1061edc
-
SHA512
3a85344642b91462e6248108dd6fed59f0ea1a7ee222e2d720d79febe4828fc826d3b46d319eb11c1029c6a2e8541b4d608cf1f31db8e7c215015ced2317be89
-
SSDEEP
98304:EikNJQQyLRdnrTPIUL4VfSytWvlNMxNRcXpJ0ADxnIC:jkNS9LPvPDkBelNAcZJPn1
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-