General
-
Target
681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c.bin
-
Size
3.2MB
-
Sample
240614-apd7sa1dnn
-
MD5
5980eb10e48de34b102deff85d574be0
-
SHA1
611f659aaf6cc2ae139ca857b8a80e4a118aa0cc
-
SHA256
681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c
-
SHA512
c1ae0a18f674fc2d3c802d3224ccfaaba65b40596107e4b1b098a47be99ba8ecb070ecf03d1202880a5d2eaf9b00b88836e2b33b6e5043b8257d7e1318c3a7c2
-
SSDEEP
98304:yWJECs296ETOp2VgUk3XH2ZQvUzfrivHlA:yW6Cs2IwUkkHH08W
Static task
static1
Behavioral task
behavioral1
Sample
681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c.bin
-
Size
3.2MB
-
MD5
5980eb10e48de34b102deff85d574be0
-
SHA1
611f659aaf6cc2ae139ca857b8a80e4a118aa0cc
-
SHA256
681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c
-
SHA512
c1ae0a18f674fc2d3c802d3224ccfaaba65b40596107e4b1b098a47be99ba8ecb070ecf03d1202880a5d2eaf9b00b88836e2b33b6e5043b8257d7e1318c3a7c2
-
SSDEEP
98304:yWJECs296ETOp2VgUk3XH2ZQvUzfrivHlA:yW6Cs2IwUkkHH08W
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1