General
-
Target
ttnzd_20161123.apk
-
Size
2.3MB
-
Sample
240524-nwkj2afg8v
-
MD5
763880f5402eb8610cc159525a1e74a0
-
SHA1
4a99c641477d7b26f8c6d63a62253c7bdb2d922e
-
SHA256
6b00733e4334ca53bb5a867945afad0f6ae19266da7c25dc15cdfa3749957465
-
SHA512
333855da78160a4355aedaac051c1d1e5eda9bdec47b75c9a6ab0c0561fd8f98ded6db9792cefe05861cad83b60fd8edd646bce841923fd27786dbd476a4f116
-
SSDEEP
49152:ehEIzBmvpJZQYtMAO+CXa4LtuGZJMTwkad++rjNn4Y22t/h4Mk3JamtG:fIBmVQYtMAO+CKkgwrfjp4Yhnk3JamtG
Static task
static1
Behavioral task
behavioral1
Sample
ttnzd_20161123.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
ttnzd_20161123.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
ttnzd_20161123.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
ttnzd_20161123.apk
-
Size
2.3MB
-
MD5
763880f5402eb8610cc159525a1e74a0
-
SHA1
4a99c641477d7b26f8c6d63a62253c7bdb2d922e
-
SHA256
6b00733e4334ca53bb5a867945afad0f6ae19266da7c25dc15cdfa3749957465
-
SHA512
333855da78160a4355aedaac051c1d1e5eda9bdec47b75c9a6ab0c0561fd8f98ded6db9792cefe05861cad83b60fd8edd646bce841923fd27786dbd476a4f116
-
SSDEEP
49152:ehEIzBmvpJZQYtMAO+CXa4LtuGZJMTwkad++rjNn4Y22t/h4Mk3JamtG:fIBmVQYtMAO+CKkgwrfjp4Yhnk3JamtG
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-