General
-
Target
test.apk
-
Size
6.2MB
-
Sample
241103-lnj77azqcv
-
MD5
d77743ed2417bd5b04a167994e2c91a5
-
SHA1
5109d579fc1cd06f54ac3e947bd2ffb7f161b726
-
SHA256
c9c96b84f575c696924e16dcfdc0b0a93b39d9a31a5c0fcce31a662a56a39863
-
SHA512
473226db537c5c300fdd96f7c80730501771bbd866b0e287ab610b23cf2ad739bfdf6c0a06e801474176530a489847a7882ee3a1f62ecfc3414512c7229dc4c5
-
SSDEEP
196608:VZ5iXh2vtPQq1bo/tZXck2yLH5CtXvVS1B:KetYuboDMiH52Y1B
Static task
static1
Behavioral task
behavioral1
Sample
test.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
test.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
test.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
test.apk
-
Size
6.2MB
-
MD5
d77743ed2417bd5b04a167994e2c91a5
-
SHA1
5109d579fc1cd06f54ac3e947bd2ffb7f161b726
-
SHA256
c9c96b84f575c696924e16dcfdc0b0a93b39d9a31a5c0fcce31a662a56a39863
-
SHA512
473226db537c5c300fdd96f7c80730501771bbd866b0e287ab610b23cf2ad739bfdf6c0a06e801474176530a489847a7882ee3a1f62ecfc3414512c7229dc4c5
-
SSDEEP
196608:VZ5iXh2vtPQq1bo/tZXck2yLH5CtXvVS1B:KetYuboDMiH52Y1B
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-