General
-
Target
psbmobile.apk
-
Size
111.4MB
-
Sample
241009-wwsjmsvgmb
-
MD5
8828f8690be3b802dcd998c0ce83eb4c
-
SHA1
2f4ae01348690b35838fd8ea73475724867b9ed9
-
SHA256
032e60ff6efa035a8490710ec133d1924425f9d8a0219a75a91011e6207d48f5
-
SHA512
c58fcaddac4fe5fa2ee142d41b54cb993f7cc78ef51ebded9d4d6250ecaff878af57a517f58859edad4570aa0606bbb01f712c127af41a0b4bbf107b6c7bdea4
-
SSDEEP
3145728:KYlp1LllGNTxw73EcMdeWh1cJ51BHgexoAFra3p:K4lg0UxbPW51BHLoAWp
Static task
static1
Behavioral task
behavioral1
Sample
psbmobile.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
psbmobile.apk
-
Size
111.4MB
-
MD5
8828f8690be3b802dcd998c0ce83eb4c
-
SHA1
2f4ae01348690b35838fd8ea73475724867b9ed9
-
SHA256
032e60ff6efa035a8490710ec133d1924425f9d8a0219a75a91011e6207d48f5
-
SHA512
c58fcaddac4fe5fa2ee142d41b54cb993f7cc78ef51ebded9d4d6250ecaff878af57a517f58859edad4570aa0606bbb01f712c127af41a0b4bbf107b6c7bdea4
-
SSDEEP
3145728:KYlp1LllGNTxw73EcMdeWh1cJ51BHgexoAFra3p:K4lg0UxbPW51BHLoAWp
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-