General
-
Target
b6d18262f5e296cf9c5a8595d0d7c619.apk
-
Size
5.3MB
-
Sample
240626-stzndszgqg
-
MD5
b6d18262f5e296cf9c5a8595d0d7c619
-
SHA1
e09d7657ac3bc28334c1e13e7d85e79fc8cc3b5f
-
SHA256
c2b6bb2e7b6732ba753f3d17ec71adf1f06c9d4cea65e4debc312bf0163d68b6
-
SHA512
02b33fea324694b38149abb4881e56b8221dc40d2356a75aa37d1f5515a0196fe681d275d7635e08ee5d6d8fa458e8a286dceaceb878112ed3db4b7fda4728a8
-
SSDEEP
98304:vX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LUXk2fWgyn9RR2QzHPVoTwr5xpif:CvH0fpstpnVMVMAPHZhpLwk2fvK24Npi
Behavioral task
behavioral1
Sample
b6d18262f5e296cf9c5a8595d0d7c619.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b6d18262f5e296cf9c5a8595d0d7c619.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b6d18262f5e296cf9c5a8595d0d7c619.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
axbanker
https://sheet-14c1d-default-rtdb.firebaseio.com
Targets
-
-
Target
b6d18262f5e296cf9c5a8595d0d7c619.apk
-
Size
5.3MB
-
MD5
b6d18262f5e296cf9c5a8595d0d7c619
-
SHA1
e09d7657ac3bc28334c1e13e7d85e79fc8cc3b5f
-
SHA256
c2b6bb2e7b6732ba753f3d17ec71adf1f06c9d4cea65e4debc312bf0163d68b6
-
SHA512
02b33fea324694b38149abb4881e56b8221dc40d2356a75aa37d1f5515a0196fe681d275d7635e08ee5d6d8fa458e8a286dceaceb878112ed3db4b7fda4728a8
-
SSDEEP
98304:vX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LUXk2fWgyn9RR2QzHPVoTwr5xpif:CvH0fpstpnVMVMAPHZhpLwk2fvK24Npi
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-