General
-
Target
Apktool_M_v2.4.0-2411022024110201.apk
-
Size
14.6MB
-
Sample
241105-bd2pdasajp
-
MD5
0ca2010676c3fa52caf3de03240dcbb0
-
SHA1
a49071d3b6b574ff84d3aab8577a57b05e25592f
-
SHA256
e84bdab8c76e3da5a546987785360e75d5311ad417c7c025103e5e26b89583a3
-
SHA512
86c15046374b043482a2a2ae71c5a803461d34236d4aa7fcc082e58fdb4481011510a8da1a46e0a970f47a5584b13533a2d273d30ec0dacf3aa41c4db5f16fa6
-
SSDEEP
196608:ypeF6FEviy1hxiQelQ+um3r/NRQxTovH2mAkF20jiEgmqugO3tikaRr9FfWS:SeoFEv3NsFumTMTovHSEgnujokaheS
Static task
static1
Behavioral task
behavioral1
Sample
Apktool_M_v2.4.0-2411022024110201.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Apktool_M_v2.4.0-2411022024110201.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
Apktool_M_v2.4.0-2411022024110201.apk
-
Size
14.6MB
-
MD5
0ca2010676c3fa52caf3de03240dcbb0
-
SHA1
a49071d3b6b574ff84d3aab8577a57b05e25592f
-
SHA256
e84bdab8c76e3da5a546987785360e75d5311ad417c7c025103e5e26b89583a3
-
SHA512
86c15046374b043482a2a2ae71c5a803461d34236d4aa7fcc082e58fdb4481011510a8da1a46e0a970f47a5584b13533a2d273d30ec0dacf3aa41c4db5f16fa6
-
SSDEEP
196608:ypeF6FEviy1hxiQelQ+um3r/NRQxTovH2mAkF20jiEgmqugO3tikaRr9FfWS:SeoFEv3NsFumTMTovHSEgnujokaheS
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-