General
-
Target
detiktoto.apk
-
Size
82KB
-
Sample
240703-bfw7nsyhjd
-
MD5
942ced1ebbc554158fa3423c3d50d7ee
-
SHA1
574423a6816df2d1095518f16dd553f8c7100de1
-
SHA256
b19650f62ef7dd2f0a7f609270bfb9800119ec24b80df4a7f01da0c45070d914
-
SHA512
2181640f459c2ceea3d2d7593651807f9c4e50879d142e72c3325130edda4d3b55b17fbda3a25c9ca1536d2b56b999c8cba2c73071f47552d68ff0e1b9f84d3a
-
SSDEEP
1536:BHmHfJbUU4lmqjItxfCcIQ8Be4+VCGItvGWE4aB:NAYmIIt98jBG4LeWEb
Static task
static1
Behavioral task
behavioral1
Sample
detiktoto.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
detiktoto.apk
-
Size
82KB
-
MD5
942ced1ebbc554158fa3423c3d50d7ee
-
SHA1
574423a6816df2d1095518f16dd553f8c7100de1
-
SHA256
b19650f62ef7dd2f0a7f609270bfb9800119ec24b80df4a7f01da0c45070d914
-
SHA512
2181640f459c2ceea3d2d7593651807f9c4e50879d142e72c3325130edda4d3b55b17fbda3a25c9ca1536d2b56b999c8cba2c73071f47552d68ff0e1b9f84d3a
-
SSDEEP
1536:BHmHfJbUU4lmqjItxfCcIQ8Be4+VCGItvGWE4aB:NAYmIIt98jBG4LeWEb
Score7/10-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-