General
-
Target
sib.V9.apk
-
Size
3.6MB
-
Sample
240620-jy2twaxclf
-
MD5
e17d939e03943dd8c9388914e4127319
-
SHA1
c52aed7e93e5926c8a2f0c948dd5b7d7a297a11a
-
SHA256
ad50f075a694d84ccabb013b2b518f13e07009bd5544f42b3f9ccf5254fe1b02
-
SHA512
15f06e84c2829363f4f2a6496968b59bca240d128f5dec18f36ce00284051ec6e8a9c55bd311258496efc4c989ceec3d7ea16832ec1eaf08ae28b130b9bb39cf
-
SSDEEP
49152:IuKaXmm7E9J9gPAwKnXj9u3Y6ByMjgNv0LQftADTTpsydB3OVb8YiDN0pIpvvT:IutTEdBg6MjkOQ1ATpsyTOF5c6YT
Static task
static1
Behavioral task
behavioral1
Sample
sib.V9.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
sib.V9.apk
-
Size
3.6MB
-
MD5
e17d939e03943dd8c9388914e4127319
-
SHA1
c52aed7e93e5926c8a2f0c948dd5b7d7a297a11a
-
SHA256
ad50f075a694d84ccabb013b2b518f13e07009bd5544f42b3f9ccf5254fe1b02
-
SHA512
15f06e84c2829363f4f2a6496968b59bca240d128f5dec18f36ce00284051ec6e8a9c55bd311258496efc4c989ceec3d7ea16832ec1eaf08ae28b130b9bb39cf
-
SSDEEP
49152:IuKaXmm7E9J9gPAwKnXj9u3Y6ByMjgNv0LQftADTTpsydB3OVb8YiDN0pIpvvT:IutTEdBg6MjkOQ1ATpsyTOF5c6YT
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-