General
-
Target
rovio-classics-angry-birds-v1.1.1408.apk
-
Size
98.9MB
-
Sample
240909-3ajg6svgnr
-
MD5
c279b887e26e1715be53b8d5d530994a
-
SHA1
3db170fb6951f04acc903c3a9aa3540af3d1aecc
-
SHA256
3761ece4537efd4399e9233a11b1e813c91dc2111ae012a7ed7aa7a521219116
-
SHA512
0156776157c3db30f74a9693fe2c79a0e384950db9b5b683fc84248c29bd2c8ef8455af41b42d9f031217310fa53c7269bb487f97ccbb4d43be72cacc2045613
-
SSDEEP
3145728:D6DLAAafvVbVZ4zKeZBHVdjffQZ6RWpwZ2nS0:D6UdbVZ4zKepdjHQZ6RWpwAp
Static task
static1
Behavioral task
behavioral1
Sample
rovio-classics-angry-birds-v1.1.1408.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
rovio-classics-angry-birds-v1.1.1408.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
rovio-classics-angry-birds-v1.1.1408.apk
-
Size
98.9MB
-
MD5
c279b887e26e1715be53b8d5d530994a
-
SHA1
3db170fb6951f04acc903c3a9aa3540af3d1aecc
-
SHA256
3761ece4537efd4399e9233a11b1e813c91dc2111ae012a7ed7aa7a521219116
-
SHA512
0156776157c3db30f74a9693fe2c79a0e384950db9b5b683fc84248c29bd2c8ef8455af41b42d9f031217310fa53c7269bb487f97ccbb4d43be72cacc2045613
-
SSDEEP
3145728:D6DLAAafvVbVZ4zKeZBHVdjffQZ6RWpwZ2nS0:D6UdbVZ4zKepdjHQZ6RWpwAp
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-