General
-
Target
com.codeway.chatapp-2.0.7.apk
-
Size
173.2MB
-
Sample
240624-dacl7avhka
-
MD5
04baaf80c2aee6c761a2e85a07432dab
-
SHA1
a6b42682d42a77d7ee0762fb5be6da033f2a1525
-
SHA256
bcafca3631dd107a396d5b679c5f5e10a9c2fb159e03af2f026d45a3ac1d318e
-
SHA512
045334f4ac04aad6b523873c33c682a654b3e63860023623b4c46dbd9aa9998ea0d008e0936cd0d2e827323fc31827b47900bc6ff577d664e407c6df6520135e
-
SSDEEP
3145728:Rdstah5g489EqQ49NAgxKZy+TZcF7lDqXAFrfYf:7staL8GqQGxgVcF7gXAFY
Static task
static1
Behavioral task
behavioral1
Sample
com.codeway.chatapp-2.0.7.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
com.codeway.chatapp-2.0.7.apk
-
Size
173.2MB
-
MD5
04baaf80c2aee6c761a2e85a07432dab
-
SHA1
a6b42682d42a77d7ee0762fb5be6da033f2a1525
-
SHA256
bcafca3631dd107a396d5b679c5f5e10a9c2fb159e03af2f026d45a3ac1d318e
-
SHA512
045334f4ac04aad6b523873c33c682a654b3e63860023623b4c46dbd9aa9998ea0d008e0936cd0d2e827323fc31827b47900bc6ff577d664e407c6df6520135e
-
SSDEEP
3145728:Rdstah5g489EqQ49NAgxKZy+TZcF7lDqXAFrfYf:7staL8GqQGxgVcF7gXAFY
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2