General
-
Target
upload-simulator-2-mnogo-deneg-15011-androeed.store-0-1703930999.apk
-
Size
99.4MB
-
Sample
240522-rj7etaeb3t
-
MD5
8b47a931880cdea959ae77f1a285dd57
-
SHA1
954111d03705fb053c03f6f756f21b440d881105
-
SHA256
58a0f24477e5ff0d61e8b144590bec0c00c85645ccec1a75aaf5717fc8ff6d17
-
SHA512
65468e2f40db6279adc2257635325824e40f4a01d1a873023de63930fd6ab2eca866081b904ee3797d43a05c07fe36e1c937b2ee387349bfca838576c1392dd2
-
SSDEEP
3145728:TyPGuYxrdxtebWVyqk7hZiVztcIN4nbARr:gqjV5YIBcQ4cZ
Static task
static1
Behavioral task
behavioral1
Sample
upload-simulator-2-mnogo-deneg-15011-androeed.store-0-1703930999.apk
Resource
android-33-x64-arm64-20240514-en
Behavioral task
behavioral2
Sample
upload-simulator-2-mnogo-deneg-15011-androeed.store-0-1703930999.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
upload-simulator-2-mnogo-deneg-15011-androeed.store-0-1703930999.apk
-
Size
99.4MB
-
MD5
8b47a931880cdea959ae77f1a285dd57
-
SHA1
954111d03705fb053c03f6f756f21b440d881105
-
SHA256
58a0f24477e5ff0d61e8b144590bec0c00c85645ccec1a75aaf5717fc8ff6d17
-
SHA512
65468e2f40db6279adc2257635325824e40f4a01d1a873023de63930fd6ab2eca866081b904ee3797d43a05c07fe36e1c937b2ee387349bfca838576c1392dd2
-
SSDEEP
3145728:TyPGuYxrdxtebWVyqk7hZiVztcIN4nbARr:gqjV5YIBcQ4cZ
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-