General
-
Target
com.visax.varisa_3.0.apk
-
Size
5.4MB
-
Sample
240528-qx8dlagg56
-
MD5
97b8df6a48145e6afaaaf4df5e204c07
-
SHA1
dac8a2e72c453cc53c794a9d4d677bc20c845436
-
SHA256
eca02a7dbca7a85c78bd76931bb7ae7a284f98009af7223b8c3c68ef095b7c50
-
SHA512
361b676781075598907a749f428a18eeb36f01c2cc868dd538c686edbea470a07c4e4d8417ee43b8dc2ae1ab521bc0cfe47f1cd9e94c802eead9527679331ded
-
SSDEEP
98304:pz4WDwYtM6CDZIvtVufuX/PYwP5rJuxzKZD2Q752J7/qkkerrxxi+tJPSWvv7QuX:lXvtMxmouXth1smZtVg/ZkerygQuX
Static task
static1
Behavioral task
behavioral1
Sample
com.visax.varisa_3.0.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
com.visax.varisa_3.0.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
com.visax.varisa_3.0.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
com.visax.varisa_3.0.apk
-
Size
5.4MB
-
MD5
97b8df6a48145e6afaaaf4df5e204c07
-
SHA1
dac8a2e72c453cc53c794a9d4d677bc20c845436
-
SHA256
eca02a7dbca7a85c78bd76931bb7ae7a284f98009af7223b8c3c68ef095b7c50
-
SHA512
361b676781075598907a749f428a18eeb36f01c2cc868dd538c686edbea470a07c4e4d8417ee43b8dc2ae1ab521bc0cfe47f1cd9e94c802eead9527679331ded
-
SSDEEP
98304:pz4WDwYtM6CDZIvtVufuX/PYwP5rJuxzKZD2Q752J7/qkkerrxxi+tJPSWvv7QuX:lXvtMxmouXth1smZtVg/ZkerygQuX
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-