General
-
Target
com.yufu.intfire.apk
-
Size
8.4MB
-
Sample
240522-n9jvnagf47
-
MD5
9df722417f9ae7ce8800c934af9c3596
-
SHA1
7eddf88d4b2cfc9eaf4e98b3d1aa43b572b307d5
-
SHA256
b2e3fee4ef3d48a7d8d53e4ed226efa70d4341c73d4b91b9194cbd01e98367cb
-
SHA512
4e46b51faba21f9040969d787c7639dcca978f07d8be61b37b085ee365a870ff1ac4f0b64561bf5ef33a8265dd74e54e58c49d26dfeaa333f2a581a674a145d3
-
SSDEEP
196608:JMHbEFwiStUy2b3Vyp8g9rUmM+ITVgtoe+uVxKSVdBzpT:JWYS6b5Je+SNrV
Static task
static1
Behavioral task
behavioral1
Sample
com.yufu.intfire.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
com.yufu.intfire.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
com.yufu.intfire.apk
-
Size
8.4MB
-
MD5
9df722417f9ae7ce8800c934af9c3596
-
SHA1
7eddf88d4b2cfc9eaf4e98b3d1aa43b572b307d5
-
SHA256
b2e3fee4ef3d48a7d8d53e4ed226efa70d4341c73d4b91b9194cbd01e98367cb
-
SHA512
4e46b51faba21f9040969d787c7639dcca978f07d8be61b37b085ee365a870ff1ac4f0b64561bf5ef33a8265dd74e54e58c49d26dfeaa333f2a581a674a145d3
-
SSDEEP
196608:JMHbEFwiStUy2b3Vyp8g9rUmM+ITVgtoe+uVxKSVdBzpT:JWYS6b5Je+SNrV
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-