General
-
Target
Fake Catch it.apk
-
Size
11.5MB
-
Sample
241101-r89lgaznhy
-
MD5
a01bbbc32766d4ceb754dd5f8ff74e60
-
SHA1
af5ed8e578881b953f9b9d607773dcfd78acc528
-
SHA256
013560e97963de21913a59cfea79cedad719aa01306e871614e8d56caf239c47
-
SHA512
ab08ae1f65bf04d4e12bc8ff55067d0af331b47afd92857ae457c32ec1ae566d838adad3afe5c8597d951688b5a56e52397efe1428802cdf3d6a5ab15cd9105a
-
SSDEEP
98304:slvm930asfKvPo/KrEVrgvry/XcWVS/s5njbCtCEmMqDNVSZi:wasyErKbWc8juISZi
Static task
static1
Behavioral task
behavioral1
Sample
Fake Catch it.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
Fake Catch it.apk
-
Size
11.5MB
-
MD5
a01bbbc32766d4ceb754dd5f8ff74e60
-
SHA1
af5ed8e578881b953f9b9d607773dcfd78acc528
-
SHA256
013560e97963de21913a59cfea79cedad719aa01306e871614e8d56caf239c47
-
SHA512
ab08ae1f65bf04d4e12bc8ff55067d0af331b47afd92857ae457c32ec1ae566d838adad3afe5c8597d951688b5a56e52397efe1428802cdf3d6a5ab15cd9105a
-
SSDEEP
98304:slvm930asfKvPo/KrEVrgvry/XcWVS/s5njbCtCEmMqDNVSZi:wasyErKbWc8juISZi
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-