General
-
Target
tentacle locker_1.0_APKPure.apk
-
Size
29.1MB
-
Sample
240523-d9axmscf6x
-
MD5
1465348187503c832b526822198a8bce
-
SHA1
cbdd6941483eb54c6de174f47e59fbaea86245f0
-
SHA256
0592bd0cd486386a40c271ce4bd8f6b04d2924e8ce37202fe86bfe160eb27f78
-
SHA512
ab216e460ea7e51f951067d0e0f4741c4391e05ec196672d42718c928ef2ba5c0029779d40b6f42e2c83faf3fe84ed04b94bbc0c282f49d26e17cd0af7c69147
-
SSDEEP
786432:0oLmgbLScJa5QeSoKsNmiFR8dIBhhqpZU8Hc3rWzauNODJwbv:/9LScPJsQiFR8Oh+ZlWuN8Kv
Static task
static1
Behavioral task
behavioral1
Sample
tentacle locker_1.0_APKPure.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
tentacle locker_1.0_APKPure.apk
-
Size
29.1MB
-
MD5
1465348187503c832b526822198a8bce
-
SHA1
cbdd6941483eb54c6de174f47e59fbaea86245f0
-
SHA256
0592bd0cd486386a40c271ce4bd8f6b04d2924e8ce37202fe86bfe160eb27f78
-
SHA512
ab216e460ea7e51f951067d0e0f4741c4391e05ec196672d42718c928ef2ba5c0029779d40b6f42e2c83faf3fe84ed04b94bbc0c282f49d26e17cd0af7c69147
-
SSDEEP
786432:0oLmgbLScJa5QeSoKsNmiFR8dIBhhqpZU8Hc3rWzauNODJwbv:/9LScPJsQiFR8Oh+ZlWuN8Kv
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Checks if the internet connection is available
-