General
-
Target
app0.apk
-
Size
7.5MB
-
Sample
240524-ntq9ssff56
-
MD5
e27d8392696956d77f75fae7191e641e
-
SHA1
973e932e7c04e1d6606eebb960dc4ce5a635dd46
-
SHA256
372c044485e5798002a476bce7edbf8f97de78bdb8b81e0917a5e0d48fca166a
-
SHA512
96127ef376514bc70a7a0cdaa4e87238811b8793323e33fdbfa96381f11884ab2e4219ee6cb3057371e094ffe4eb29ef6e71fafc190f4adecde2330aaff3996c
-
SSDEEP
196608:PHWMaZMJsWzKE3AfMDgf8wgQqgAd4JZ7DqPWy:Ooq43AUMf8wwgAdqZ65
Static task
static1
Behavioral task
behavioral1
Sample
app0.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
app0.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
app0.apk
-
Size
7.5MB
-
MD5
e27d8392696956d77f75fae7191e641e
-
SHA1
973e932e7c04e1d6606eebb960dc4ce5a635dd46
-
SHA256
372c044485e5798002a476bce7edbf8f97de78bdb8b81e0917a5e0d48fca166a
-
SHA512
96127ef376514bc70a7a0cdaa4e87238811b8793323e33fdbfa96381f11884ab2e4219ee6cb3057371e094ffe4eb29ef6e71fafc190f4adecde2330aaff3996c
-
SSDEEP
196608:PHWMaZMJsWzKE3AfMDgf8wgQqgAd4JZ7DqPWy:Ooq43AUMf8wwgAdqZ65
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-