General
-
Target
Virtual Rosetoy_1_1.0.apk
-
Size
5.9MB
-
Sample
240711-16jfyawgkn
-
MD5
dc771e318b91e89e7bd6da15580190b5
-
SHA1
842110c214f145d29e6e2032b8ce6e405d663e95
-
SHA256
d971c90b5c3f06595f0b92502e44c2c358454f6876df9eab5c86cd80efb92bec
-
SHA512
b347cd133e3467d7ecb8e34fe7f794dfd8a642d64ed2f5fdf0c22f0a4dfeaf63be374e12c3499b08ac59e52fd7eb3c4bcff3e43b41da17375671604bb737a679
-
SSDEEP
98304:7DvoqhqlGTnwvGWBq6cuPctTKIyvFuLGFmMZw8duK83AId67cX7i0rOeg:7Dvoq8lennWBq6bP0TavFu1MZw8dN83q
Static task
static1
Behavioral task
behavioral1
Sample
Virtual Rosetoy_1_1.0.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
Virtual Rosetoy_1_1.0.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
Virtual Rosetoy_1_1.0.apk
-
Size
5.9MB
-
MD5
dc771e318b91e89e7bd6da15580190b5
-
SHA1
842110c214f145d29e6e2032b8ce6e405d663e95
-
SHA256
d971c90b5c3f06595f0b92502e44c2c358454f6876df9eab5c86cd80efb92bec
-
SHA512
b347cd133e3467d7ecb8e34fe7f794dfd8a642d64ed2f5fdf0c22f0a4dfeaf63be374e12c3499b08ac59e52fd7eb3c4bcff3e43b41da17375671604bb737a679
-
SSDEEP
98304:7DvoqhqlGTnwvGWBq6cuPctTKIyvFuLGFmMZw8duK83AId67cX7i0rOeg:7Dvoq8lennWBq6bP0TavFu1MZw8dN83q
Score7/10-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
-
-
Target
Virtual Rosetoy_1_1.0.apk
-
Size
3.4MB
-
MD5
60d4d71a4820f7712af3347721fac4c7
-
SHA1
50d65acc84bad110df9d75a443b1f599151e8301
-
SHA256
ebd5538698a4731e4ef080398d75b2a2d91a9381f9f1129e62c9eee0791551cb
-
SHA512
e35d7d5490acf2ffa0882ce4953b2f6e89b62b370d9e36c90d81760fe242e1998ce7294aadbc9e17fde7096e25468fbd306afd3f72d71c81eafb1bd15db46570
-
SSDEEP
49152:7Dd9oqzN3al/eTnwCoG5Seu7heIdIPwiB1yWxqBWYpWogZk7i0rOELNl:7DvoqhqlGTnwvGsAId67oX7i0rOAz
Score7/10-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-