General
-
Target
debug.apk
-
Size
7.1MB
-
Sample
240522-n53f7sfh5w
-
MD5
6ccf20450978cddc36a6dc6cc8bfc14f
-
SHA1
b74826afd024352ce5b62d3592ac98a51bcc4918
-
SHA256
e732a71958619e8b845410c137146b574f17b9eaaabfb1f3171037ef8f2dd8ac
-
SHA512
08522dce68198f08e6fce9c20ad75ee4b14bbdfcd0c1e2729f0d4809dbb9ed2e7dd90a0bfa8352cd7295fec3dee515cfd85a582c10116eee1166df382b3feeb7
-
SSDEEP
98304:MDJwLKoTwru9x8TdcGTY+YdokswkRjGyd9Gv/VqJPjNuFBGsAIQ/6bkbVa:2J6x8TenbshhrdO/oJPRAGsA6CVa
Static task
static1
Behavioral task
behavioral1
Sample
debug.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
debug.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
debug.apk
-
Size
7.1MB
-
MD5
6ccf20450978cddc36a6dc6cc8bfc14f
-
SHA1
b74826afd024352ce5b62d3592ac98a51bcc4918
-
SHA256
e732a71958619e8b845410c137146b574f17b9eaaabfb1f3171037ef8f2dd8ac
-
SHA512
08522dce68198f08e6fce9c20ad75ee4b14bbdfcd0c1e2729f0d4809dbb9ed2e7dd90a0bfa8352cd7295fec3dee515cfd85a582c10116eee1166df382b3feeb7
-
SSDEEP
98304:MDJwLKoTwru9x8TdcGTY+YdokswkRjGyd9Gv/VqJPjNuFBGsAIQ/6bkbVa:2J6x8TenbshhrdO/oJPRAGsA6CVa
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-