General
-
Target
12868393899490795126447922726795263icici-reward.apk
-
Size
2.7MB
-
Sample
241104-jkcb3axdld
-
MD5
968f6fa5f24f0848449d0c6a491e6587
-
SHA1
0b56bc08a6f0068eb2b85761c897bdac81a0356f
-
SHA256
0aebd90ac204ae0a181c568a4f6e9e02cd7bb4fa231e7a8a6a74d841dd9599fd
-
SHA512
582ee4ef3c5c583336cec303caba2257e4249685d31ac71732bc38378c5a493ffce9be4553ff24303a59ad7f803c14d489c70ba9329ebcfbbf80cdd8fa6ad418
-
SSDEEP
49152:mi/dWuxlWDj+23Qu8w5ldxYa1xo1YD5bEjaDTKkR/w4gKZ3wJS:mWUyl+j+ub5l0a1W1YD5bEjaHKk1DZ3R
Static task
static1
Behavioral task
behavioral1
Sample
12868393899490795126447922726795263icici-reward.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
12868393899490795126447922726795263icici-reward.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
12868393899490795126447922726795263icici-reward.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
12868393899490795126447922726795263icici-reward.apk
-
Size
2.7MB
-
MD5
968f6fa5f24f0848449d0c6a491e6587
-
SHA1
0b56bc08a6f0068eb2b85761c897bdac81a0356f
-
SHA256
0aebd90ac204ae0a181c568a4f6e9e02cd7bb4fa231e7a8a6a74d841dd9599fd
-
SHA512
582ee4ef3c5c583336cec303caba2257e4249685d31ac71732bc38378c5a493ffce9be4553ff24303a59ad7f803c14d489c70ba9329ebcfbbf80cdd8fa6ad418
-
SSDEEP
49152:mi/dWuxlWDj+23Qu8w5ldxYa1xo1YD5bEjaDTKkR/w4gKZ3wJS:mWUyl+j+ub5l0a1W1YD5bEjaHKk1DZ3R
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Requests changing the default SMS application.
-