General
-
Target
app3.apk
-
Size
6.2MB
-
Sample
240524-p8bckaea71
-
MD5
93ccab42d2a0b21b79d5327c0a2bbf8d
-
SHA1
6ef7d44dffbe5d437b800ec5c27db59f0f73cbb9
-
SHA256
2f83fc274a7eece93357394c2c829d3339a2de39d5678b9d3b98e1060d9ba452
-
SHA512
c9467be5da79a25d86e89dce7646388508ed59bde0b56748e6e3183497c251db572dd61c0116e766e50dcad56caf0cfb77b833bd216e250fc20a1423aa0a6e9b
-
SSDEEP
98304:yxfKSaFSWvboD9tDWcWHkOqZFq3dcUgARDrXIo9i+J2bQeoQY0OsPW2Z7DSJE6P/:Lxvg9xKEGZgAd4J+gQYPW+7DU
Static task
static1
Behavioral task
behavioral1
Sample
app3.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
app3.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
app3.apk
-
Size
6.2MB
-
MD5
93ccab42d2a0b21b79d5327c0a2bbf8d
-
SHA1
6ef7d44dffbe5d437b800ec5c27db59f0f73cbb9
-
SHA256
2f83fc274a7eece93357394c2c829d3339a2de39d5678b9d3b98e1060d9ba452
-
SHA512
c9467be5da79a25d86e89dce7646388508ed59bde0b56748e6e3183497c251db572dd61c0116e766e50dcad56caf0cfb77b833bd216e250fc20a1423aa0a6e9b
-
SSDEEP
98304:yxfKSaFSWvboD9tDWcWHkOqZFq3dcUgARDrXIo9i+J2bQeoQY0OsPW2Z7DSJE6P/:Lxvg9xKEGZgAd4J+gQYPW+7DU
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-