General
-
Target
Logseq-android-0.10.9.apk
-
Size
32.6MB
-
Sample
241031-knmsmswpam
-
MD5
947518cc7653a222469ad6f3891b52e8
-
SHA1
87baeeca6bfd09e9c1e0abf344de1b6a0c01085e
-
SHA256
938798825b9b7e0f64040ccf476fe9e6afb71fd20824e25d9fc3f3f79af32ecb
-
SHA512
4d79dc6b8f71d87b62a7b4d2738a9cf43be408546cde07e849650e02f54fd0be816afffb51d3a88574eb4c35623cb321b09bbbb297ab14f4dc96a9458bb031ec
-
SSDEEP
786432:dbbMNnp0+uz2l84kEgA1w2RYNa50PlApzdA27VNa6:dbANnp5S4GATqNaSPb6
Static task
static1
Behavioral task
behavioral1
Sample
Logseq-android-0.10.9.apk
Resource
android-33-x64-arm64-20240624-de
Malware Config
Targets
-
-
Target
Logseq-android-0.10.9.apk
-
Size
32.6MB
-
MD5
947518cc7653a222469ad6f3891b52e8
-
SHA1
87baeeca6bfd09e9c1e0abf344de1b6a0c01085e
-
SHA256
938798825b9b7e0f64040ccf476fe9e6afb71fd20824e25d9fc3f3f79af32ecb
-
SHA512
4d79dc6b8f71d87b62a7b4d2738a9cf43be408546cde07e849650e02f54fd0be816afffb51d3a88574eb4c35623cb321b09bbbb297ab14f4dc96a9458bb031ec
-
SSDEEP
786432:dbbMNnp0+uz2l84kEgA1w2RYNa50PlApzdA27VNa6:dbANnp5S4GATqNaSPb6
Score7/10-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks the presence of a debugger
-