General
-
Target
iii.apk
-
Size
5.0MB
-
Sample
241101-j321fazphl
-
MD5
7d8a322b92694d4308353b51ee6f88cb
-
SHA1
9ec1c73094d4a0ce87c01957d4bc39326a0ec863
-
SHA256
7231864d8dd0975ff36f051c4970101bdf1b6822b9aee108dbf8f912b9112634
-
SHA512
df26b67d9af6d32793d0317a851b152d20de47c5a003c1ab67b3d33f62ace75e26957ad3b6abbac5721a597920c03fce8ba733ef750c972020cbf3d1bec4b602
-
SSDEEP
98304:R7i6W2tlu7hFC0Ktw+62LhXhbOZSSAwuum31pgR+2ydSmJOEIbAc:jtc779uw+6EhcSSL8pg2sCXIb5
Static task
static1
Behavioral task
behavioral1
Sample
iii.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
iii.apk
-
Size
5.0MB
-
MD5
7d8a322b92694d4308353b51ee6f88cb
-
SHA1
9ec1c73094d4a0ce87c01957d4bc39326a0ec863
-
SHA256
7231864d8dd0975ff36f051c4970101bdf1b6822b9aee108dbf8f912b9112634
-
SHA512
df26b67d9af6d32793d0317a851b152d20de47c5a003c1ab67b3d33f62ace75e26957ad3b6abbac5721a597920c03fce8ba733ef750c972020cbf3d1bec4b602
-
SSDEEP
98304:R7i6W2tlu7hFC0Ktw+62LhXhbOZSSAwuum31pgR+2ydSmJOEIbAc:jtc779uw+6EhcSSL8pg2sCXIb5
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-