General
-
Target
com.noahcdesign.fnquiz.apk
-
Size
79.6MB
-
Sample
240712-scrlfsydjr
-
MD5
714b1d9751507c41095d4a8051fe07e5
-
SHA1
5878c722dc654a0a3d3fa478662420efe6edffb2
-
SHA256
9f1f5d0d8a628c5715ea899d93eaf3e9dd716bcee35ce74d21832e8d3829803b
-
SHA512
138a2f10b7c71bb401e0be88f95057c15f08da2ba1f48a18eefddbdd75dbb3264371d655b6189a5dd1e4afa5520f434f69e285f0fd614cfb250ccebb9baa016c
-
SSDEEP
1572864:8TxR80YZR80YbR80YAR80Y0R80Y7R80Y6R80YNR80YoR80YmR80YAR80YdR80Ybi:8Pe8BZEPmJH9eEPq2j0FHiQ
Static task
static1
Behavioral task
behavioral1
Sample
com.noahcdesign.fnquiz.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
com.noahcdesign.fnquiz.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
com.noahcdesign.fnquiz.apk
-
Size
79.6MB
-
MD5
714b1d9751507c41095d4a8051fe07e5
-
SHA1
5878c722dc654a0a3d3fa478662420efe6edffb2
-
SHA256
9f1f5d0d8a628c5715ea899d93eaf3e9dd716bcee35ce74d21832e8d3829803b
-
SHA512
138a2f10b7c71bb401e0be88f95057c15f08da2ba1f48a18eefddbdd75dbb3264371d655b6189a5dd1e4afa5520f434f69e285f0fd614cfb250ccebb9baa016c
-
SSDEEP
1572864:8TxR80YZR80YbR80YAR80Y0R80Y7R80Y6R80YNR80YoR80YmR80YAR80YdR80Ybi:8Pe8BZEPmJH9eEPq2j0FHiQ
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-