General
-
Target
804ba5ecd53d0b8f81136ddcf672a9851eeda17d5a4b2fc5b2b361eaa668a2cc.bin
-
Size
3.4MB
-
Sample
241104-13tgqsycjd
-
MD5
ccd9a5cd7a6c60f2f7e791fc39329722
-
SHA1
a53c1ca600257f7f4a89186968978a6a02840ead
-
SHA256
804ba5ecd53d0b8f81136ddcf672a9851eeda17d5a4b2fc5b2b361eaa668a2cc
-
SHA512
528f33722da8b4805ac829cd17b1e330aea49a2eba399fff669ede9f5b3153c0d939d646de3337de374faeeebf97b17aa30a290d3453bb6c28f83c5458720287
-
SSDEEP
98304:1oCX6/iLcD2xyn8h+GbGlIrYSF2d2ofroB2dB/3:1otiLcU28cGqCFTGB/3
Static task
static1
Behavioral task
behavioral1
Sample
804ba5ecd53d0b8f81136ddcf672a9851eeda17d5a4b2fc5b2b361eaa668a2cc.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
804ba5ecd53d0b8f81136ddcf672a9851eeda17d5a4b2fc5b2b361eaa668a2cc.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
804ba5ecd53d0b8f81136ddcf672a9851eeda17d5a4b2fc5b2b361eaa668a2cc.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
804ba5ecd53d0b8f81136ddcf672a9851eeda17d5a4b2fc5b2b361eaa668a2cc.bin
-
Size
3.4MB
-
MD5
ccd9a5cd7a6c60f2f7e791fc39329722
-
SHA1
a53c1ca600257f7f4a89186968978a6a02840ead
-
SHA256
804ba5ecd53d0b8f81136ddcf672a9851eeda17d5a4b2fc5b2b361eaa668a2cc
-
SHA512
528f33722da8b4805ac829cd17b1e330aea49a2eba399fff669ede9f5b3153c0d939d646de3337de374faeeebf97b17aa30a290d3453bb6c28f83c5458720287
-
SSDEEP
98304:1oCX6/iLcD2xyn8h+GbGlIrYSF2d2ofroB2dB/3:1otiLcU28cGqCFTGB/3
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1