General
-
Target
DEEP_VAULT_69-v0.3.0a-release.apk
-
Size
901.2MB
-
Sample
240522-sqrtdaff5w
-
MD5
fe0fe98228413dccec1a850f4afdcb06
-
SHA1
10bb119e390ce1b08d4836e266e9ebb50026a56a
-
SHA256
7529b98382d27c30227ed7867997939e5d6605644b93336635cd837b4080536c
-
SHA512
cf44701673084cceefeac89143c60fa79b67d5868a5aa2021df186a35424f885c5863f6035b23cfa7355ace9470dd3958979a183ecc898059f34134af5b7f684
-
SSDEEP
25165824:0NYHthCrhwoFc1qsPfAoFdIC/faNwwtY2ea:qsovc1XV+wwtYva
Static task
static1
Behavioral task
behavioral1
Sample
DEEP_VAULT_69-v0.3.0a-release.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
DEEP_VAULT_69-v0.3.0a-release.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
DEEP_VAULT_69-v0.3.0a-release.apk
-
Size
901.2MB
-
MD5
fe0fe98228413dccec1a850f4afdcb06
-
SHA1
10bb119e390ce1b08d4836e266e9ebb50026a56a
-
SHA256
7529b98382d27c30227ed7867997939e5d6605644b93336635cd837b4080536c
-
SHA512
cf44701673084cceefeac89143c60fa79b67d5868a5aa2021df186a35424f885c5863f6035b23cfa7355ace9470dd3958979a183ecc898059f34134af5b7f684
-
SSDEEP
25165824:0NYHthCrhwoFc1qsPfAoFdIC/faNwwtY2ea:qsovc1XV+wwtYva
Score7/10-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Listens for changes in the sensor environment (might be used to detect emulation)
-