General
-
Target
ec3e046e3ec9519fde99e35cfae3a958.apk
-
Size
5.3MB
-
Sample
240701-kg51msveqr
-
MD5
ec3e046e3ec9519fde99e35cfae3a958
-
SHA1
cc6caaf13f5ef7b5e845cee881c0fd63b3d48455
-
SHA256
07d47a836fe5f766119bfc3ed8f9f4c51db57890a2252f44712e1fa043a20bae
-
SHA512
9ff9503f5f0335263f310522f39ec5b36fec0ed4a99062df8c2ad9cb78df9c91ae57ecf3f02f81f91574d0ec6679dbcb9d5475856ccc8c50de58176b792b2762
-
SSDEEP
98304:HX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LUhkeSUC/v9pWZHT/JoTwr5xpiXu:qvH0fpstpnVMVMAPHZhpLGke/gWVhpD
Behavioral task
behavioral1
Sample
ec3e046e3ec9519fde99e35cfae3a958.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ec3e046e3ec9519fde99e35cfae3a958.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ec3e046e3ec9519fde99e35cfae3a958.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
axbanker
https://sheet-14c1d-default-rtdb.firebaseio.com
Targets
-
-
Target
ec3e046e3ec9519fde99e35cfae3a958.apk
-
Size
5.3MB
-
MD5
ec3e046e3ec9519fde99e35cfae3a958
-
SHA1
cc6caaf13f5ef7b5e845cee881c0fd63b3d48455
-
SHA256
07d47a836fe5f766119bfc3ed8f9f4c51db57890a2252f44712e1fa043a20bae
-
SHA512
9ff9503f5f0335263f310522f39ec5b36fec0ed4a99062df8c2ad9cb78df9c91ae57ecf3f02f81f91574d0ec6679dbcb9d5475856ccc8c50de58176b792b2762
-
SSDEEP
98304:HX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LUhkeSUC/v9pWZHT/JoTwr5xpiXu:qvH0fpstpnVMVMAPHZhpLGke/gWVhpD
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-