General
-
Target
app8.apk
-
Size
6.2MB
-
Sample
240524-pmp9labg43
-
MD5
646d5f28ee20dd11ab11710543cb8e50
-
SHA1
3595ca48868c68e9fad512ab8a10499228bfa087
-
SHA256
e35599b4f61a433e154780cba615ca3017a5cb1bdd3b29e933916af2f18ccc0c
-
SHA512
e1f426f006c08b1ff0edbb52f72d8454ce9f3cf61f67c0692fd2811308f35e0075d057f2b0745a02568f41fa4cc90c13f91e420eea92fb4ed6c710b18711292f
-
SSDEEP
196608:8T8/GNYpI1PM1WTpqY94J+gQqgAe7DqPWX:a8WYpI1DpqY9q+wgAe66
Static task
static1
Behavioral task
behavioral1
Sample
app8.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
app8.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
app8.apk
-
Size
6.2MB
-
MD5
646d5f28ee20dd11ab11710543cb8e50
-
SHA1
3595ca48868c68e9fad512ab8a10499228bfa087
-
SHA256
e35599b4f61a433e154780cba615ca3017a5cb1bdd3b29e933916af2f18ccc0c
-
SHA512
e1f426f006c08b1ff0edbb52f72d8454ce9f3cf61f67c0692fd2811308f35e0075d057f2b0745a02568f41fa4cc90c13f91e420eea92fb4ed6c710b18711292f
-
SSDEEP
196608:8T8/GNYpI1PM1WTpqY94J+gQqgAe7DqPWX:a8WYpI1DpqY9q+wgAe66
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks the presence of a debugger
-