General
-
Target
07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88
-
Size
9.4MB
-
Sample
240528-jjnnpsce26
-
MD5
efb8696f788a650219f1233fcf6be79b
-
SHA1
72000a7faad1c40d56e49e9c36c2692e31b3ef59
-
SHA256
07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88
-
SHA512
a8a04b77546084b5bb63f5f9e443a24123a4a8c425201dc98c0d37f2c723e122d077c7c50e157ee26ced69a00baf943167ffa67588f48b7aade652485db70fa2
-
SSDEEP
196608:DP5lb3ljyXEpy8bDRUYTnHb4Jao3GEi/+dM2WR2VCUHufTrkI1LL3aNbAGR90R:DP5lDEXE4ADRUYTHKPaHrf1H3gAG7M
Static task
static1
Behavioral task
behavioral1
Sample
07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88
-
Size
9.4MB
-
MD5
efb8696f788a650219f1233fcf6be79b
-
SHA1
72000a7faad1c40d56e49e9c36c2692e31b3ef59
-
SHA256
07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88
-
SHA512
a8a04b77546084b5bb63f5f9e443a24123a4a8c425201dc98c0d37f2c723e122d077c7c50e157ee26ced69a00baf943167ffa67588f48b7aade652485db70fa2
-
SSDEEP
196608:DP5lb3ljyXEpy8bDRUYTnHb4Jao3GEi/+dM2WR2VCUHufTrkI1LL3aNbAGR90R:DP5lDEXE4ADRUYTHKPaHrf1H3gAG7M
-
Android SMSeye payload
-
SMSeye
SMSeye is an open source Android spyware that targets Android SMS.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-