General
-
Target
ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5.bin
-
Size
4.5MB
-
Sample
241104-1xcxss1jfk
-
MD5
774468d6358206c8037a1d078c572337
-
SHA1
4af0e1b0afa1ad7615a6c8127a4d19ede56fc084
-
SHA256
ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5
-
SHA512
c09fbfdc5607ee064e6ed5e1dc5ae3c838888c4eac8db83072b9a10265919f3df78b2876c413590bdd13e784cfb6f3500bec39721c5339602f4a8182bc3a5e39
-
SSDEEP
98304:LaR/wDDnDo/6OJ3A9d2sgQNhC3ehGzfrtELrvHUA2pF5wvgkO:LaODLDyJ3A9dRNhzHLrXMwvdO
Static task
static1
Behavioral task
behavioral1
Sample
ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5.bin
-
Size
4.5MB
-
MD5
774468d6358206c8037a1d078c572337
-
SHA1
4af0e1b0afa1ad7615a6c8127a4d19ede56fc084
-
SHA256
ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5
-
SHA512
c09fbfdc5607ee064e6ed5e1dc5ae3c838888c4eac8db83072b9a10265919f3df78b2876c413590bdd13e784cfb6f3500bec39721c5339602f4a8182bc3a5e39
-
SSDEEP
98304:LaR/wDDnDo/6OJ3A9d2sgQNhC3ehGzfrtELrvHUA2pF5wvgkO:LaODLDyJ3A9dRNhzHLrXMwvdO
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Legitimate hosting services abused for malware hosting/C2
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-