General
-
Target
AAAOlineV1.12.1.apk
-
Size
13.6MB
-
Sample
240522-pcs8hahc83
-
MD5
7c85932ee309fe53e3da1b52b08ab231
-
SHA1
85255dc8a4085644dcd984c17aa881b67e7b6f1f
-
SHA256
74b99a307b562bb2e61cad33e5a3d1bc4d5a0caffe620f329b1262aa74293d8b
-
SHA512
503c5c7ba17edb22b88361cfd065fed22aeb0208f3ba4b34aac37d55b93a3106533491a0f2f2ee8de0518706dafae889774e0e470de6e72387a556b12049d0cc
-
SSDEEP
393216:EpazKOUKNyPm1nhHhZ9fFobs/OfxBmzXQhabZaWI:ItOXNB1hBZNFbOfxBmDuf
Static task
static1
Behavioral task
behavioral1
Sample
AAAOlineV1.12.1.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
AAAOlineV1.12.1.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
AAAOlineV1.12.1.apk
-
Size
13.6MB
-
MD5
7c85932ee309fe53e3da1b52b08ab231
-
SHA1
85255dc8a4085644dcd984c17aa881b67e7b6f1f
-
SHA256
74b99a307b562bb2e61cad33e5a3d1bc4d5a0caffe620f329b1262aa74293d8b
-
SHA512
503c5c7ba17edb22b88361cfd065fed22aeb0208f3ba4b34aac37d55b93a3106533491a0f2f2ee8de0518706dafae889774e0e470de6e72387a556b12049d0cc
-
SSDEEP
393216:EpazKOUKNyPm1nhHhZ9fFobs/OfxBmzXQhabZaWI:ItOXNB1hBZNFbOfxBmDuf
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-