General
-
Target
VIMO-1.6.apk
-
Size
12.7MB
-
Sample
240521-gmd8bsga87
-
MD5
6c1110a92fac2bf5e7d03f9a8b475652
-
SHA1
948ec4b60c6973d7126f6bfc92aa15b117046fd2
-
SHA256
4148fa7c33eb8322f83dae8668a3d4461fade2541181ab0aaed93c2caac22008
-
SHA512
02f18168f5e36b66f8c0816b724c4cb02e3a19a609f02a308ca1a1d388a09f9ea836beebf3cc5f6a7f4a6028121fe203d1095d5bb7af1bdc788ff54be085522a
-
SSDEEP
393216:MXTvgcCfgc7tR4SRnHh52OF483NqxGklKD/VE6:Ma4eHh5bXsG6KDNb
Static task
static1
Behavioral task
behavioral1
Sample
VIMO-1.6.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
VIMO-1.6.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
VIMO-1.6.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
VIMO-1.6.apk
-
Size
12.7MB
-
MD5
6c1110a92fac2bf5e7d03f9a8b475652
-
SHA1
948ec4b60c6973d7126f6bfc92aa15b117046fd2
-
SHA256
4148fa7c33eb8322f83dae8668a3d4461fade2541181ab0aaed93c2caac22008
-
SHA512
02f18168f5e36b66f8c0816b724c4cb02e3a19a609f02a308ca1a1d388a09f9ea836beebf3cc5f6a7f4a6028121fe203d1095d5bb7af1bdc788ff54be085522a
-
SSDEEP
393216:MXTvgcCfgc7tR4SRnHh52OF483NqxGklKD/VE6:Ma4eHh5bXsG6KDNb
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-