General
-
Target
base.apk
-
Size
8.6MB
-
Sample
240913-xa5shssanl
-
MD5
0f9e499294caacbcd515eeb8ce437afe
-
SHA1
2c9fd958e5a5474a358e2e561c19b244ca2ee356
-
SHA256
3e545df7b9e9bf2221eb42a7d0d9b45183ea205583767d612c4cf489c9cfe962
-
SHA512
8377ff9bd8f17739b4f76f157d87a8fb666ab75cc114c69509cfc4d947435c989b2df0c81cedab3189f4b42cf2b7ec9beb03523ba2506b9cbd2427f218a17b3d
-
SSDEEP
196608:vFNHoD0zdv10PkSrm7QeyZA0VQMVQ8VQaVQwVQ6:vXIDqd9JSS7QeyO0iMi8iaiwi6
Behavioral task
behavioral1
Sample
base.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
rafelrat
https://lovehurts.000webhostapp.com/Server_Panel/public/commands.php
Targets
-
-
Target
base.apk
-
Size
8.6MB
-
MD5
0f9e499294caacbcd515eeb8ce437afe
-
SHA1
2c9fd958e5a5474a358e2e561c19b244ca2ee356
-
SHA256
3e545df7b9e9bf2221eb42a7d0d9b45183ea205583767d612c4cf489c9cfe962
-
SHA512
8377ff9bd8f17739b4f76f157d87a8fb666ab75cc114c69509cfc4d947435c989b2df0c81cedab3189f4b42cf2b7ec9beb03523ba2506b9cbd2427f218a17b3d
-
SSDEEP
196608:vFNHoD0zdv10PkSrm7QeyZA0VQMVQ8VQaVQwVQ6:vXIDqd9JSS7QeyO0iMi8iaiwi6
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Legitimate hosting services abused for malware hosting/C2
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Probable phishing domain
-