General
-
Target
E78A8DFF098C31BBBAA3F2F6321DC9D99A5DFB14278B0936169B590B737FA78B.apk
-
Size
9.0MB
-
Sample
240627-j8rfwstckk
-
MD5
5a600a4de059b271fa8fc71206f8c91a
-
SHA1
eaf5035ed3017e1ee4c2853328adec7f20a4d2e1
-
SHA256
e78a8dff098c31bbbaa3f2f6321dc9d99a5dfb14278b0936169b590b737fa78b
-
SHA512
99bb188ca400be26c340976ba010864a886e8930adbf13f31c4b5c85033714fa94c9cbc76a6af7e0dd0168a92b4358477519ae015c40c9816d05f5a1a2640ae8
-
SSDEEP
196608:DYiOSyuYlCuJFbNuxe6ejx5YO7RRlxPxpYvY2aq7fELyiqegaJMwLfCSQwxyouf:DTyLCucM6IoOfxp07gFqNajLCSQwTuf
Static task
static1
Behavioral task
behavioral1
Sample
E78A8DFF098C31BBBAA3F2F6321DC9D99A5DFB14278B0936169B590B737FA78B.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
E78A8DFF098C31BBBAA3F2F6321DC9D99A5DFB14278B0936169B590B737FA78B.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
E78A8DFF098C31BBBAA3F2F6321DC9D99A5DFB14278B0936169B590B737FA78B.apk
-
Size
9.0MB
-
MD5
5a600a4de059b271fa8fc71206f8c91a
-
SHA1
eaf5035ed3017e1ee4c2853328adec7f20a4d2e1
-
SHA256
e78a8dff098c31bbbaa3f2f6321dc9d99a5dfb14278b0936169b590b737fa78b
-
SHA512
99bb188ca400be26c340976ba010864a886e8930adbf13f31c4b5c85033714fa94c9cbc76a6af7e0dd0168a92b4358477519ae015c40c9816d05f5a1a2640ae8
-
SSDEEP
196608:DYiOSyuYlCuJFbNuxe6ejx5YO7RRlxPxpYvY2aq7fELyiqegaJMwLfCSQwxyouf:DTyLCucM6IoOfxp07gFqNajLCSQwTuf
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-