General
-
Target
drawer.apk
-
Size
3.5MB
-
Sample
240522-n5g59sfg7t
-
MD5
fbab3b301d93a9eb4c62f0802beba473
-
SHA1
9e9dfecf608d27c747fafcdbf5e5ca61774c199c
-
SHA256
a321ebaa92dce5836cb0fce6743f4ff5b2b177350d74fd6822da82baaa3c8a92
-
SHA512
1474b541fac318f67cc2c17288eaa4e0f0e0ab8e998b79998cac7bc97ae79cc9116d4d8c8bbcc6dac1625179de124347f3fc63217c701988ff8a688690ce7fae
-
SSDEEP
98304:q41/9CTd3wz/yw3evtmVQCHgXyBx7BEIBYrmlnd:q456dAz53amVQCHH7BJYGd
Static task
static1
Behavioral task
behavioral1
Sample
drawer.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
drawer.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
drawer.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
drawer.apk
-
Size
3.5MB
-
MD5
fbab3b301d93a9eb4c62f0802beba473
-
SHA1
9e9dfecf608d27c747fafcdbf5e5ca61774c199c
-
SHA256
a321ebaa92dce5836cb0fce6743f4ff5b2b177350d74fd6822da82baaa3c8a92
-
SHA512
1474b541fac318f67cc2c17288eaa4e0f0e0ab8e998b79998cac7bc97ae79cc9116d4d8c8bbcc6dac1625179de124347f3fc63217c701988ff8a688690ce7fae
-
SSDEEP
98304:q41/9CTd3wz/yw3evtmVQCHgXyBx7BEIBYrmlnd:q456dAz53amVQCHH7BJYGd
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-