General
-
Target
c3256b91234624addc8b6ffe089ebe1b45b839e1d772abcf62cace376f473ba7.bin
-
Size
2.5MB
-
Sample
240801-123c9aydpp
-
MD5
5a3ed72e1ad54c1f38ea48812472b649
-
SHA1
1fc3e73f876887dbc235d1564a8122023d55b386
-
SHA256
c3256b91234624addc8b6ffe089ebe1b45b839e1d772abcf62cace376f473ba7
-
SHA512
a4a293dd39b72d2f2c25a52df158da0549f6a1c2175f9b2850b7a54f24ddf7fc093cdde4a7b117f5b4c83ba5e0afa6f2c3515eaaed4bb9708c3fa93b5bf7fbf8
-
SSDEEP
49152:Pvyj76X6+Glm+nJVxAfWgLs/H7naTgjucPq8lwrRTpT/heBDDg1OOzkI+Wjy3rZF:YP+G0+JLsLs/uUjuMwl5UlDKkI+Wu3v
Static task
static1
Behavioral task
behavioral1
Sample
c3256b91234624addc8b6ffe089ebe1b45b839e1d772abcf62cace376f473ba7.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c3256b91234624addc8b6ffe089ebe1b45b839e1d772abcf62cace376f473ba7.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c3256b91234624addc8b6ffe089ebe1b45b839e1d772abcf62cace376f473ba7.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
c3256b91234624addc8b6ffe089ebe1b45b839e1d772abcf62cace376f473ba7.bin
-
Size
2.5MB
-
MD5
5a3ed72e1ad54c1f38ea48812472b649
-
SHA1
1fc3e73f876887dbc235d1564a8122023d55b386
-
SHA256
c3256b91234624addc8b6ffe089ebe1b45b839e1d772abcf62cace376f473ba7
-
SHA512
a4a293dd39b72d2f2c25a52df158da0549f6a1c2175f9b2850b7a54f24ddf7fc093cdde4a7b117f5b4c83ba5e0afa6f2c3515eaaed4bb9708c3fa93b5bf7fbf8
-
SSDEEP
49152:Pvyj76X6+Glm+nJVxAfWgLs/H7naTgjucPq8lwrRTpT/heBDDg1OOzkI+Wjy3rZF:YP+G0+JLsLs/uUjuMwl5UlDKkI+Wu3v
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Hide Artifacts
1Suppress Application Icon
1Input Injection
1Virtualization/Sandbox Evasion
1System Checks
1Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
1System Network Configuration Discovery
1System Network Connections Discovery
1