General
-
Target
AE5185906795D5A7741A942130B81B463CF1BACFBE690001931C57DA76662C87.apk
-
Size
4.5MB
-
Sample
240627-kh91zsvclq
-
MD5
5bd7324b9401ef2b1f2320931fdf2532
-
SHA1
94f348de9902047b56c565733fc9b8d3b5ad554d
-
SHA256
ae5185906795d5a7741a942130b81b463cf1bacfbe690001931c57da76662c87
-
SHA512
1d088f081a8d1d941063945b20e7926d8260c9a08b1f4a064b45584a28e49c7b5f138c4a53bc5fac4ed9d7a3ebe57265840b0ac6c57627d71cb8879268a90c76
-
SSDEEP
98304:rYJb5etFox5Fk694j7vieM5M8NUhxp3+Z5SC1m4u:ELeqFHG/A43+Z5S8G
Static task
static1
Behavioral task
behavioral1
Sample
AE5185906795D5A7741A942130B81B463CF1BACFBE690001931C57DA76662C87.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
AE5185906795D5A7741A942130B81B463CF1BACFBE690001931C57DA76662C87.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
AE5185906795D5A7741A942130B81B463CF1BACFBE690001931C57DA76662C87.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
AE5185906795D5A7741A942130B81B463CF1BACFBE690001931C57DA76662C87.apk
-
Size
4.5MB
-
MD5
5bd7324b9401ef2b1f2320931fdf2532
-
SHA1
94f348de9902047b56c565733fc9b8d3b5ad554d
-
SHA256
ae5185906795d5a7741a942130b81b463cf1bacfbe690001931c57da76662c87
-
SHA512
1d088f081a8d1d941063945b20e7926d8260c9a08b1f4a064b45584a28e49c7b5f138c4a53bc5fac4ed9d7a3ebe57265840b0ac6c57627d71cb8879268a90c76
-
SSDEEP
98304:rYJb5etFox5Fk694j7vieM5M8NUhxp3+Z5SC1m4u:ELeqFHG/A43+Z5S8G
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2