General
-
Target
app1.apk
-
Size
6.2MB
-
Sample
240524-pe6avaad9w
-
MD5
f72b084405f9fed876c4361903790d11
-
SHA1
40c7044f4cdb3f0ed2f73d95d21abc4e73263061
-
SHA256
e6c5bda87d76a180c59a9e97c544abf9fcfcf9ae54ffdf421042fce11040685a
-
SHA512
9ed5ff31184b2b3659d447a8b5178433e8983565665584ab696e212fb8b0a45cdd57c9dabf24495c88d47b067a3d35c3c8c548689cecf57e05a40fd64dd54506
-
SSDEEP
98304:l/e46c+WR/KWcWHkqoDa5aqZZlL2DcZUgARDrXIo9ihQY0OsPWLJ2bQe4Z7DSJEP:5RhZKKE3a3m3gAd4JKPWLgQb7D3
Static task
static1
Behavioral task
behavioral1
Sample
app1.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
app1.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
app1.apk
-
Size
6.2MB
-
MD5
f72b084405f9fed876c4361903790d11
-
SHA1
40c7044f4cdb3f0ed2f73d95d21abc4e73263061
-
SHA256
e6c5bda87d76a180c59a9e97c544abf9fcfcf9ae54ffdf421042fce11040685a
-
SHA512
9ed5ff31184b2b3659d447a8b5178433e8983565665584ab696e212fb8b0a45cdd57c9dabf24495c88d47b067a3d35c3c8c548689cecf57e05a40fd64dd54506
-
SSDEEP
98304:l/e46c+WR/KWcWHkqoDa5aqZZlL2DcZUgARDrXIo9ihQY0OsPWLJ2bQe4Z7DSJEP:5RhZKKE3a3m3gAd4JKPWLgQb7D3
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-