General
-
Target
AAAoutline-1-11-0.apk
-
Size
13.0MB
-
Sample
240522-phl2daad7t
-
MD5
5e0e5256238b69dd2e86d6564f85685b
-
SHA1
6826c2d48d8b0f32711b2901c0966f1767cc4d43
-
SHA256
9cdf037fde06590256c8640ebe3b0f6664f969ba23edd3665c1e129036ac3d50
-
SHA512
00130f7aee8a740e3709fef0355c226efa23b3bfb8fed1314b4c04f54245d9e3dd8efa8c99e4b5ffe68d16ffdb85fa5712a018e11a14f84a328532ebaee29241
-
SSDEEP
393216:obu1gdlfEzWPdGRlV9UmsKvbU5ZNXqB5HtRp:GuKiAGR9UtWwdgtX
Static task
static1
Behavioral task
behavioral1
Sample
AAAoutline-1-11-0.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
AAAoutline-1-11-0.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
AAAoutline-1-11-0.apk
-
Size
13.0MB
-
MD5
5e0e5256238b69dd2e86d6564f85685b
-
SHA1
6826c2d48d8b0f32711b2901c0966f1767cc4d43
-
SHA256
9cdf037fde06590256c8640ebe3b0f6664f969ba23edd3665c1e129036ac3d50
-
SHA512
00130f7aee8a740e3709fef0355c226efa23b3bfb8fed1314b4c04f54245d9e3dd8efa8c99e4b5ffe68d16ffdb85fa5712a018e11a14f84a328532ebaee29241
-
SSDEEP
393216:obu1gdlfEzWPdGRlV9UmsKvbU5ZNXqB5HtRp:GuKiAGR9UtWwdgtX
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-