General
-
Target
app4.apk
-
Size
6.2MB
-
Sample
240524-ns449sfe58
-
MD5
ee2a7ba2bf44336212036ca1956dd66a
-
SHA1
72338d4e663effbd3eba6981dfdf2845901adb5d
-
SHA256
9a731120b2e7e19a292abbc2f3a0470035c9e58f2ecfcd12d572ba9c7ef58077
-
SHA512
c010007b1335fc0a7f611d2a6a82ba91047e4e045ef132f955bc8fa6382d16e947fb55426c5a81a990317eb69b1ff49743ab1a81dfabf4fe0872199fe4aab57e
-
SSDEEP
98304:vQkVd/YPabtvNqZmoD9WcWHkAtu23UgAWZ7DSJE6PI8DrXIo9ihQY0OsPWLJ2bQs:fd/YPahS9KEZjgAe7Dm4JKPWLgQs
Static task
static1
Behavioral task
behavioral1
Sample
app4.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
app4.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
app4.apk
-
Size
6.2MB
-
MD5
ee2a7ba2bf44336212036ca1956dd66a
-
SHA1
72338d4e663effbd3eba6981dfdf2845901adb5d
-
SHA256
9a731120b2e7e19a292abbc2f3a0470035c9e58f2ecfcd12d572ba9c7ef58077
-
SHA512
c010007b1335fc0a7f611d2a6a82ba91047e4e045ef132f955bc8fa6382d16e947fb55426c5a81a990317eb69b1ff49743ab1a81dfabf4fe0872199fe4aab57e
-
SSDEEP
98304:vQkVd/YPabtvNqZmoD9WcWHkAtu23UgAWZ7DSJE6PI8DrXIo9ihQY0OsPWLJ2bQs:fd/YPahS9KEZjgAe7Dm4JKPWLgQs
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-