General
-
Target
jetz.apk
-
Size
1.1MB
-
Sample
240523-qdgfrsca5z
-
MD5
82375a76ee45a1b02ca3dc9a5c88ab9f
-
SHA1
2115e361fb82912daff18892f00ca1fdd9ae6929
-
SHA256
2fbacfca96da0bc3b89cbf4bc494e010a8fa780bbe235abbed97344cc8c96434
-
SHA512
e869600ed17ede6f2814830e36d4a576a9c3da5c46d6b4fe84e62a2fa9eb3f029618c46248e7dc4a95de7375ccdc29bf010c6adae19470e51868511bd501c226
-
SSDEEP
24576:87djr0BQ2LyYRNKrm1X9u7wnnK0d8on/Zm+zqSNZxV:60BQ2+YDKo9uwluczd1V
Static task
static1
Behavioral task
behavioral1
Sample
jetz.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
jetz.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
jetz.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
jetz.apk
-
Size
1.1MB
-
MD5
82375a76ee45a1b02ca3dc9a5c88ab9f
-
SHA1
2115e361fb82912daff18892f00ca1fdd9ae6929
-
SHA256
2fbacfca96da0bc3b89cbf4bc494e010a8fa780bbe235abbed97344cc8c96434
-
SHA512
e869600ed17ede6f2814830e36d4a576a9c3da5c46d6b4fe84e62a2fa9eb3f029618c46248e7dc4a95de7375ccdc29bf010c6adae19470e51868511bd501c226
-
SSDEEP
24576:87djr0BQ2LyYRNKrm1X9u7wnnK0d8on/Zm+zqSNZxV:60BQ2+YDKo9uwluczd1V
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-