General
-
Target
ff5ab26128b5cbbc7e99ea77c471890be6bd4bdedf0d5f5da75b8b665281ac13.bin
-
Size
3.5MB
-
Sample
240602-25wkjsbf59
-
MD5
4f0c145d907c19078376fb0097c74d0a
-
SHA1
873a2084e84251a2a18adf828e3b4a84d8f2e067
-
SHA256
ff5ab26128b5cbbc7e99ea77c471890be6bd4bdedf0d5f5da75b8b665281ac13
-
SHA512
f446a24a8a0215de469470eff72558cfdaf437033ec6ea378a6f50396098afd8c38ccd74e5a973853398a4409dda452d4be110d7ea8302666645b95e7fb091de
-
SSDEEP
98304:H0JKGeg0qff908sW6EouowAAL6Ke/BDocLn/U:UKGPdsjJuowAA/eJHc
Static task
static1
Behavioral task
behavioral1
Sample
ff5ab26128b5cbbc7e99ea77c471890be6bd4bdedf0d5f5da75b8b665281ac13.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
ff5ab26128b5cbbc7e99ea77c471890be6bd4bdedf0d5f5da75b8b665281ac13.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
ff5ab26128b5cbbc7e99ea77c471890be6bd4bdedf0d5f5da75b8b665281ac13.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
ff5ab26128b5cbbc7e99ea77c471890be6bd4bdedf0d5f5da75b8b665281ac13.bin
-
Size
3.5MB
-
MD5
4f0c145d907c19078376fb0097c74d0a
-
SHA1
873a2084e84251a2a18adf828e3b4a84d8f2e067
-
SHA256
ff5ab26128b5cbbc7e99ea77c471890be6bd4bdedf0d5f5da75b8b665281ac13
-
SHA512
f446a24a8a0215de469470eff72558cfdaf437033ec6ea378a6f50396098afd8c38ccd74e5a973853398a4409dda452d4be110d7ea8302666645b95e7fb091de
-
SSDEEP
98304:H0JKGeg0qff908sW6EouowAAL6Ke/BDocLn/U:UKGPdsjJuowAA/eJHc
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Reads the content of SMS inbox messages.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-