General
-
Target
AF2FE81165AE6F9C3048CEADF1B43B6490C3A79121E9FC6FB0D62CA7E99E6BA4.apk
-
Size
3.2MB
-
Sample
240627-kekxpa1gnb
-
MD5
8d3b87db47fcd601bbadfb12621c86f4
-
SHA1
6d81952dc822d2c5d8834b6b882692d28711a31e
-
SHA256
af2fe81165ae6f9c3048ceadf1b43b6490c3a79121e9fc6fb0d62ca7e99e6ba4
-
SHA512
a808b897feb283989928da49809902dd9cb785bb682d59d648c0e7609848d09ee37572c1ef579d1e7de0b8662f905aa40d09e79be0758f3d229f7116494b77f2
-
SSDEEP
98304:chsQY/kKV8zIb4jV/nYfTh1XDhe7EJIXvgfxc:FQYvVlkjtgFe7EWXIfxc
Static task
static1
Behavioral task
behavioral1
Sample
AF2FE81165AE6F9C3048CEADF1B43B6490C3A79121E9FC6FB0D62CA7E99E6BA4.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
AF2FE81165AE6F9C3048CEADF1B43B6490C3A79121E9FC6FB0D62CA7E99E6BA4.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
AF2FE81165AE6F9C3048CEADF1B43B6490C3A79121E9FC6FB0D62CA7E99E6BA4.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
AF2FE81165AE6F9C3048CEADF1B43B6490C3A79121E9FC6FB0D62CA7E99E6BA4.apk
-
Size
3.2MB
-
MD5
8d3b87db47fcd601bbadfb12621c86f4
-
SHA1
6d81952dc822d2c5d8834b6b882692d28711a31e
-
SHA256
af2fe81165ae6f9c3048ceadf1b43b6490c3a79121e9fc6fb0d62ca7e99e6ba4
-
SHA512
a808b897feb283989928da49809902dd9cb785bb682d59d648c0e7609848d09ee37572c1ef579d1e7de0b8662f905aa40d09e79be0758f3d229f7116494b77f2
-
SSDEEP
98304:chsQY/kKV8zIb4jV/nYfTh1XDhe7EJIXvgfxc:FQYvVlkjtgFe7EWXIfxc
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-