General
-
Target
unionbank statement.apk
-
Size
3.1MB
-
Sample
240606-g554rsad4w
-
MD5
45c4640277c56d2d89649f194db8e3b9
-
SHA1
9978bd527dab1e32d2d3a66f1a6296ce5d8273fb
-
SHA256
933e823fcac69434b507369868aac534cd097d8d4b2d2fb20c0f2937c9ffd5e8
-
SHA512
cca69c63a7e8db3e256cfeeb9715ea405c14371c648cd350ffd1b7a7a08910743138577e361a4b324afc31c85c88012d29a5bf48c0089a331cbac5e1802e29f9
-
SSDEEP
49152:PpBlLgVq2K+eYhrMqCAjlgYfEgI7ESYD1r7wxqCDNr0z8gXVhhrEs:hvL52HtYqCM+n7ESY17kMhhrN
Static task
static1
Behavioral task
behavioral1
Sample
unionbank statement.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
unionbank statement.apk
-
Size
3.1MB
-
MD5
45c4640277c56d2d89649f194db8e3b9
-
SHA1
9978bd527dab1e32d2d3a66f1a6296ce5d8273fb
-
SHA256
933e823fcac69434b507369868aac534cd097d8d4b2d2fb20c0f2937c9ffd5e8
-
SHA512
cca69c63a7e8db3e256cfeeb9715ea405c14371c648cd350ffd1b7a7a08910743138577e361a4b324afc31c85c88012d29a5bf48c0089a331cbac5e1802e29f9
-
SSDEEP
49152:PpBlLgVq2K+eYhrMqCAjlgYfEgI7ESYD1r7wxqCDNr0z8gXVhhrEs:hvL52HtYqCM+n7ESY17kMhhrN
Score7/10-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-