General
-
Target
D SPEED 2.0.apk
-
Size
7.1MB
-
Sample
240610-r2p89azcla
-
MD5
7d137a79d7f51456ca51419e6b9a1b14
-
SHA1
1923208581fc5e3bfd1443caa1a32ee2245bef22
-
SHA256
b43104d4889e4b4c905394d43a580ddac211128a1db8094f00f6b99de264f1d8
-
SHA512
d5c5ffd0777e5d4b7a19356edc673cd1e36bd32d227ae4aabf376a55f01301fd3e164249641b1c6fb0c7a98bd63cedb4278854401878e860bef4d04b86dc3d40
-
SSDEEP
196608:FYx/1oXWagGWo1C4bDmyvv5rmbboofCg6kkUa:XWCWI5Gkv5rmbbpqLH
Static task
static1
Behavioral task
behavioral1
Sample
D SPEED 2.0.apk
Resource
android-33-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
D SPEED 2.0.apk
-
Size
7.1MB
-
MD5
7d137a79d7f51456ca51419e6b9a1b14
-
SHA1
1923208581fc5e3bfd1443caa1a32ee2245bef22
-
SHA256
b43104d4889e4b4c905394d43a580ddac211128a1db8094f00f6b99de264f1d8
-
SHA512
d5c5ffd0777e5d4b7a19356edc673cd1e36bd32d227ae4aabf376a55f01301fd3e164249641b1c6fb0c7a98bd63cedb4278854401878e860bef4d04b86dc3d40
-
SSDEEP
196608:FYx/1oXWagGWo1C4bDmyvv5rmbboofCg6kkUa:XWCWI5Gkv5rmbbpqLH
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-