General
-
Target
ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008.bin
-
Size
2.0MB
-
Sample
241104-11hx8aybnc
-
MD5
30ded60b89883bc1e9a137ed6ccd14da
-
SHA1
92a8475ed1039c1f14f1f2d7cdbaa5fa5d9febcc
-
SHA256
ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008
-
SHA512
73a38bd8938b9ebc033157a10b5dba6227ab7b1a26927f8c96a1f89efc794fefab89622f8f15da404552fe9771a4b4ade5d271086a268eccda43f280c2d1fa08
-
SSDEEP
49152:JP9o340r3oqgf1K+M7YjohrM6A8odU07NQ:JP9q7wf1K+McjgrMOod/S
Static task
static1
Behavioral task
behavioral1
Sample
ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008.bin
-
Size
2.0MB
-
MD5
30ded60b89883bc1e9a137ed6ccd14da
-
SHA1
92a8475ed1039c1f14f1f2d7cdbaa5fa5d9febcc
-
SHA256
ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008
-
SHA512
73a38bd8938b9ebc033157a10b5dba6227ab7b1a26927f8c96a1f89efc794fefab89622f8f15da404552fe9771a4b4ade5d271086a268eccda43f280c2d1fa08
-
SSDEEP
49152:JP9o340r3oqgf1K+M7YjohrM6A8odU07NQ:JP9q7wf1K+McjgrMOod/S
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-