General
-
Target
dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9
-
Size
2.0MB
-
Sample
240524-psrplsce23
-
MD5
7d0279c6e4ec3727984ac68a13b23bd7
-
SHA1
7b49ea135149bfd6d3870a882e344de195e7e6f0
-
SHA256
dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9
-
SHA512
aadfa7a053d6c51f3c807561ccaa155f01dae9bc6caf8c2b11a896b45b9291ddd695ba5bf1007937d13f35417c249bda4e94a40871f1c8a5919f0df34dc32163
-
SSDEEP
49152:I/gGuqURokkd7DHuugOq8PQNgnNnfOpLv4tmZUV:ugGuJRo/lDOugOq8INgnxU8tXV
Static task
static1
Behavioral task
behavioral1
Sample
dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9
-
Size
2.0MB
-
MD5
7d0279c6e4ec3727984ac68a13b23bd7
-
SHA1
7b49ea135149bfd6d3870a882e344de195e7e6f0
-
SHA256
dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9
-
SHA512
aadfa7a053d6c51f3c807561ccaa155f01dae9bc6caf8c2b11a896b45b9291ddd695ba5bf1007937d13f35417c249bda4e94a40871f1c8a5919f0df34dc32163
-
SSDEEP
49152:I/gGuqURokkd7DHuugOq8PQNgnNnfOpLv4tmZUV:ugGuJRo/lDOugOq8INgnxU8tXV
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-