General
-
Target
sweet_money.apk
-
Size
2.1MB
-
Sample
240606-pczqaadh9s
-
MD5
2e126b6005fc1200e8b7dbc4697c3997
-
SHA1
4e687c8877aa0d296362c3f5bfee936bb4b5a9fc
-
SHA256
bcb82bf9a65e981acdf295e16076f5125e47f4740ad8d8e8b1f29773a20f9c3a
-
SHA512
907bcb7d4377d5674066e49bf97b5d22ff36cf9d83574194c4ac99e3a772504094e70aeaf571b26f2bebfda4216aa6c71d9cd62809055408b12d0d8fd8afeaf4
-
SSDEEP
49152:rPaMvBKm79MU1QgQHGDWpMJK3973qJ5EjeNlQPyrrHPpUHdronk1kfGt:rPaMvBtRMU1OmCD9rk5hQPykdronk1k0
Static task
static1
Behavioral task
behavioral1
Sample
sweet_money.apk
Resource
android-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
sweet_money.apk
-
Size
2.1MB
-
MD5
2e126b6005fc1200e8b7dbc4697c3997
-
SHA1
4e687c8877aa0d296362c3f5bfee936bb4b5a9fc
-
SHA256
bcb82bf9a65e981acdf295e16076f5125e47f4740ad8d8e8b1f29773a20f9c3a
-
SHA512
907bcb7d4377d5674066e49bf97b5d22ff36cf9d83574194c4ac99e3a772504094e70aeaf571b26f2bebfda4216aa6c71d9cd62809055408b12d0d8fd8afeaf4
-
SSDEEP
49152:rPaMvBKm79MU1QgQHGDWpMJK3973qJ5EjeNlQPyrrHPpUHdronk1kfGt:rPaMvBtRMU1OmCD9rk5hQPykdronk1k0
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the contacts stored on the device.
-
Reads the content of photos stored on the user's device.
-
Reads the content of the call log.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-