General
-
Target
app2.apk
-
Size
6.2MB
-
Sample
240524-p3h58add7t
-
MD5
943921b03585433fb292bb12f7f3824b
-
SHA1
c6ec572687d6699d2f2170103a1134b1327a34f7
-
SHA256
dec45adae23b0883c5f34c054b030c878ea224045508ee6e35cc158e9f372347
-
SHA512
0fdf12a10a549e401fc0787415ea548993eec045167348b5b40683c0643d9964c75adf26adac875572094da6590d36bb31b9ec60f0c669f5052c285eac8bdc9a
-
SSDEEP
98304:9BqE7EI1N694qCYqZQAWWcWHkKooD0MpomQY0OsPWLJ2bQe4Z7DSJE6PI8DrXIo8:9T7N03vKEKVW1PWLgQb7Dm4JwgAi
Static task
static1
Behavioral task
behavioral1
Sample
app2.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
app2.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
app2.apk
-
Size
6.2MB
-
MD5
943921b03585433fb292bb12f7f3824b
-
SHA1
c6ec572687d6699d2f2170103a1134b1327a34f7
-
SHA256
dec45adae23b0883c5f34c054b030c878ea224045508ee6e35cc158e9f372347
-
SHA512
0fdf12a10a549e401fc0787415ea548993eec045167348b5b40683c0643d9964c75adf26adac875572094da6590d36bb31b9ec60f0c669f5052c285eac8bdc9a
-
SSDEEP
98304:9BqE7EI1N694qCYqZQAWWcWHkKooD0MpomQY0OsPWLJ2bQe4Z7DSJE6PI8DrXIo8:9T7N03vKEKVW1PWLgQb7Dm4JwgAi
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-