General
-
Target
Emtiyaz .apk
-
Size
1.4MB
-
Sample
240522-nypxjaee4w
-
MD5
a7aab9c22e5deb03fc6e6980fe9ae2d4
-
SHA1
97be1d11203ab09af5d3ea95be666d61260eb9c2
-
SHA256
961606a5c8a4551b28f860da2a8d322e2f0063fcfee07179697bf93d7d94f3a4
-
SHA512
800b4b084ef3965592a29af968cc07e7ce0b79994ad0b0e7f9d970977ff1c5327ded6f6865553ca076c20a5a035606a15b2860c06e0a54d8b36b88156594219d
-
SSDEEP
24576:V0m7XIv33im7SNjXgxHMSpOdxlbZwsY0vyl4HSZkGZzaRsiv4MUDa5GE:hXCd7SNjwxHMSpmYkHMZ+Rr9UDKGE
Static task
static1
Behavioral task
behavioral1
Sample
Emtiyaz .apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
Emtiyaz .apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
Emtiyaz .apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
Emtiyaz .apk
-
Size
1.4MB
-
MD5
a7aab9c22e5deb03fc6e6980fe9ae2d4
-
SHA1
97be1d11203ab09af5d3ea95be666d61260eb9c2
-
SHA256
961606a5c8a4551b28f860da2a8d322e2f0063fcfee07179697bf93d7d94f3a4
-
SHA512
800b4b084ef3965592a29af968cc07e7ce0b79994ad0b0e7f9d970977ff1c5327ded6f6865553ca076c20a5a035606a15b2860c06e0a54d8b36b88156594219d
-
SSDEEP
24576:V0m7XIv33im7SNjXgxHMSpOdxlbZwsY0vyl4HSZkGZzaRsiv4MUDa5GE:hXCd7SNjwxHMSpmYkHMZ+Rr9UDKGE
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Checks the presence of a debugger
-