General
-
Target
0ES20_M-Pajak.apk
-
Size
14.9MB
-
Sample
241021-syz5qaybmg
-
MD5
6270c107c32174763caf5ee3013abb96
-
SHA1
f6d3c9b2cf10ef3edb3c1d6b732fd558c89251f5
-
SHA256
9e00e23077fd90ab4fc5cd98375591161bf8508fc959265605c47b10efa2a73d
-
SHA512
20316f727da990c31fad7364d5a4966b80ab1ea0cf65abb358bd87995ac0b0048dfbb02f2074cb61738396bddc29166fe8f289bdb6f61b969e1b0f920ebe3e4f
-
SSDEEP
196608:8pN6uUP8op7rZXtEF022Mrkx/PznXfHc3OuRwXGgE5oFdqXcbpNFqkLPQFugFQ4J:8ne8qJ+RxYT8+4LoFPckLSugvpO6s3gB
Behavioral task
behavioral1
Sample
0ES20_M-Pajak.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
0ES20_M-Pajak.apk
-
Size
14.9MB
-
MD5
6270c107c32174763caf5ee3013abb96
-
SHA1
f6d3c9b2cf10ef3edb3c1d6b732fd558c89251f5
-
SHA256
9e00e23077fd90ab4fc5cd98375591161bf8508fc959265605c47b10efa2a73d
-
SHA512
20316f727da990c31fad7364d5a4966b80ab1ea0cf65abb358bd87995ac0b0048dfbb02f2074cb61738396bddc29166fe8f289bdb6f61b969e1b0f920ebe3e4f
-
SSDEEP
196608:8pN6uUP8op7rZXtEF022Mrkx/PznXfHc3OuRwXGgE5oFdqXcbpNFqkLPQFugFQ4J:8ne8qJ+RxYT8+4LoFPckLSugvpO6s3gB
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-