General
-
Target
f20a0bac3df3c4d724579608f10beb1e.apk
-
Size
5.3MB
-
Sample
240716-mwf16s1gle
-
MD5
f20a0bac3df3c4d724579608f10beb1e
-
SHA1
a0aa8c2686309aa0ffe8e63a29d7fb74f5338c05
-
SHA256
161c8274f6530ee56fc2435577b52e32ebd8e2876dcb0c072898ec112f58767c
-
SHA512
c6e5ac138d9bb62f244f679e934bf435ad913633114b613e72ad42411a2f5f2256e399ae5fa5d9ce48ecba0b9d9840f04363d3aa8eefa7ebe37006e4bb122171
-
SSDEEP
98304:bX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LU2ksCqWxi1dcAX7LZoTwr5xpiT0:GvH0fpstpnVMVMAPHZhpLlksd1cA9pN
Behavioral task
behavioral1
Sample
f20a0bac3df3c4d724579608f10beb1e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f20a0bac3df3c4d724579608f10beb1e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f20a0bac3df3c4d724579608f10beb1e.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
axbanker
https://sheet-14c1d-default-rtdb.firebaseio.com
Targets
-
-
Target
f20a0bac3df3c4d724579608f10beb1e.apk
-
Size
5.3MB
-
MD5
f20a0bac3df3c4d724579608f10beb1e
-
SHA1
a0aa8c2686309aa0ffe8e63a29d7fb74f5338c05
-
SHA256
161c8274f6530ee56fc2435577b52e32ebd8e2876dcb0c072898ec112f58767c
-
SHA512
c6e5ac138d9bb62f244f679e934bf435ad913633114b613e72ad42411a2f5f2256e399ae5fa5d9ce48ecba0b9d9840f04363d3aa8eefa7ebe37006e4bb122171
-
SSDEEP
98304:bX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LU2ksCqWxi1dcAX7LZoTwr5xpiT0:GvH0fpstpnVMVMAPHZhpLlksd1cA9pN
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-