General
-
Target
app-release.apk
-
Size
3.1MB
-
Sample
240618-x8m1csveqf
-
MD5
12dc0c92e98704a6fe7d5ebb873151ea
-
SHA1
7e006e60b56c87c654b3c72b6c9d0b48befbefa0
-
SHA256
ef8b086e0e0ef4923068a9d0d5ac2293dedb4e86a2db177e76895ff7f9551c75
-
SHA512
13bc589552f5ca5de884df7e842451318cff602693d48327967a1a1ae61987d0095c8ff48ab1c8ff5da397eebc1b4119cab5e8a5deaaa118206a0ef7e09d28ce
-
SSDEEP
98304:U7yMiuTL4W+kYhsnafPjmouYye7l6w/K9:UsuP4WGy5Yr7ldA
Static task
static1
Behavioral task
behavioral1
Sample
app-release.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
app-release.apk
-
Size
3.1MB
-
MD5
12dc0c92e98704a6fe7d5ebb873151ea
-
SHA1
7e006e60b56c87c654b3c72b6c9d0b48befbefa0
-
SHA256
ef8b086e0e0ef4923068a9d0d5ac2293dedb4e86a2db177e76895ff7f9551c75
-
SHA512
13bc589552f5ca5de884df7e842451318cff602693d48327967a1a1ae61987d0095c8ff48ab1c8ff5da397eebc1b4119cab5e8a5deaaa118206a0ef7e09d28ce
-
SSDEEP
98304:U7yMiuTL4W+kYhsnafPjmouYye7l6w/K9:UsuP4WGy5Yr7ldA
Score7/10-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-