General
-
Target
764d891373d83bdc2b5544a2f0509b346f878dba8148dde1b22ece89456221ec
-
Size
38.4MB
-
Sample
241009-jyj9ts1bma
-
MD5
afff79347b50a535ea4673e10916e6c6
-
SHA1
e6ca43b7284d732a728e73191017ba4de2d5ce2f
-
SHA256
764d891373d83bdc2b5544a2f0509b346f878dba8148dde1b22ece89456221ec
-
SHA512
db930c2071202741850593e627b85367172adb369cf29dbec07a4f894c98d93a89cfb02fc0f721698535e9ac0fe5214db1d67b54d514898637ebd6be869f9ce2
-
SSDEEP
786432:q3cKjxgUIWeirHPMz95M+j3iTCTzOfZ+T83LPDeHnnmzsDvUHT2qbkUQIi:DQxg4yZ5Rwcc+oPDeHnnmzYevkF5
Static task
static1
Behavioral task
behavioral1
Sample
764d891373d83bdc2b5544a2f0509b346f878dba8148dde1b22ece89456221ec.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
764d891373d83bdc2b5544a2f0509b346f878dba8148dde1b22ece89456221ec
-
Size
38.4MB
-
MD5
afff79347b50a535ea4673e10916e6c6
-
SHA1
e6ca43b7284d732a728e73191017ba4de2d5ce2f
-
SHA256
764d891373d83bdc2b5544a2f0509b346f878dba8148dde1b22ece89456221ec
-
SHA512
db930c2071202741850593e627b85367172adb369cf29dbec07a4f894c98d93a89cfb02fc0f721698535e9ac0fe5214db1d67b54d514898637ebd6be869f9ce2
-
SSDEEP
786432:q3cKjxgUIWeirHPMz95M+j3iTCTzOfZ+T83LPDeHnnmzsDvUHT2qbkUQIi:DQxg4yZ5Rwcc+oPDeHnnmzYevkF5
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-