General
-
Target
5812872a1cfa2c88dd7477881ee7e4015b237f35ad7cb9b3d930d291d560e6a1
-
Size
9.2MB
-
Sample
240706-1myfrawdrg
-
MD5
cb15257128695991a490b70a32e2e9f0
-
SHA1
d5bd6500ae07fe8651956da78bdae50bcb1ac4bf
-
SHA256
5812872a1cfa2c88dd7477881ee7e4015b237f35ad7cb9b3d930d291d560e6a1
-
SHA512
405edd8363992e9c918a57fedf497172c64579fbab0894d8ce221a6208d5936f758188c31ac822fb34d598e7b03af69927d7a3c07123c6205f94f6da1e058981
-
SSDEEP
196608:mO4rYye2J4LHATYmx3ynDstkgGdrjjVUntcOEZdZ7OEf6SZ:m1YyT4LgjCDgUrjZyi
Behavioral task
behavioral1
Sample
5812872a1cfa2c88dd7477881ee7e4015b237f35ad7cb9b3d930d291d560e6a1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5812872a1cfa2c88dd7477881ee7e4015b237f35ad7cb9b3d930d291d560e6a1.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
5812872a1cfa2c88dd7477881ee7e4015b237f35ad7cb9b3d930d291d560e6a1
-
Size
9.2MB
-
MD5
cb15257128695991a490b70a32e2e9f0
-
SHA1
d5bd6500ae07fe8651956da78bdae50bcb1ac4bf
-
SHA256
5812872a1cfa2c88dd7477881ee7e4015b237f35ad7cb9b3d930d291d560e6a1
-
SHA512
405edd8363992e9c918a57fedf497172c64579fbab0894d8ce221a6208d5936f758188c31ac822fb34d598e7b03af69927d7a3c07123c6205f94f6da1e058981
-
SSDEEP
196608:mO4rYye2J4LHATYmx3ynDstkgGdrjjVUntcOEZdZ7OEf6SZ:m1YyT4LgjCDgUrjZyi
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2