General
-
Target
PAD.apk
-
Size
3.1MB
-
Sample
240524-n8xp5ahe4x
-
MD5
7ba625b4dad50f4b5dc6f53f6083b428
-
SHA1
12c8196b34caa3fb2753927426633a7d3bc334ae
-
SHA256
fd52c8c3adaa383db76e922329529a25fa427a24c7d78730978651d87e596c14
-
SHA512
78245baea904a4377099cc4bbc73355d81ebad74dcad3bc34f6c81a831b17c25dfd6b95b2ce4c6ebf326f7861a87b55cb4f51a1dccf67f59f52ce254f1cdbb81
-
SSDEEP
49152:Vatf6EIGSn1qlyXrdgNBUnaOUc2TX1MDIBztRRzhS46z0ArQg2S3KCX:VSSMwXrdgNB2aOUcQluQRk0ArRKCX
Static task
static1
Behavioral task
behavioral1
Sample
PAD.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
PAD.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
PAD.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
PAD.apk
-
Size
3.1MB
-
MD5
7ba625b4dad50f4b5dc6f53f6083b428
-
SHA1
12c8196b34caa3fb2753927426633a7d3bc334ae
-
SHA256
fd52c8c3adaa383db76e922329529a25fa427a24c7d78730978651d87e596c14
-
SHA512
78245baea904a4377099cc4bbc73355d81ebad74dcad3bc34f6c81a831b17c25dfd6b95b2ce4c6ebf326f7861a87b55cb4f51a1dccf67f59f52ce254f1cdbb81
-
SSDEEP
49152:Vatf6EIGSn1qlyXrdgNBUnaOUc2TX1MDIBztRRzhS46z0ArQg2S3KCX:VSSMwXrdgNB2aOUcQluQRk0ArRKCX
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-