General
-
Target
1.apk
-
Size
14.4MB
-
Sample
240522-ntyc4sdd67
-
MD5
80289007bbf0242db24a4ac8fbd187fa
-
SHA1
02f8a743055be053db0902edc0eb078e14c2d29f
-
SHA256
e88b4c3bf31f071f41ad60aba3a28f012694f10fa2fa6fa01cdf6036e70b8d5e
-
SHA512
6fd18714bbcb8594def0799cfb865149ec4fca56ec6bc8fd39bc6448bb14f3708e76e2f63b304fd0864969a0ebead2f9256d8f9c4b8647769c57d1043946fbf5
-
SSDEEP
393216:0DLZHLzeSt/iXJAp8xMIqptyqaZW5HjQQKWlc:0RHLzeCip6tnaZW5DQRWlc
Static task
static1
Behavioral task
behavioral1
Sample
1.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
1.apk
-
Size
14.4MB
-
MD5
80289007bbf0242db24a4ac8fbd187fa
-
SHA1
02f8a743055be053db0902edc0eb078e14c2d29f
-
SHA256
e88b4c3bf31f071f41ad60aba3a28f012694f10fa2fa6fa01cdf6036e70b8d5e
-
SHA512
6fd18714bbcb8594def0799cfb865149ec4fca56ec6bc8fd39bc6448bb14f3708e76e2f63b304fd0864969a0ebead2f9256d8f9c4b8647769c57d1043946fbf5
-
SSDEEP
393216:0DLZHLzeSt/iXJAp8xMIqptyqaZW5HjQQKWlc:0RHLzeCip6tnaZW5DQRWlc
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks if the internet connection is available
-