General
-
Target
2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab.bin
-
Size
3.4MB
-
Sample
241107-11ldcasjgr
-
MD5
e7cedbfef280ceda133712e7cda8a6a9
-
SHA1
f7ecec07cbdab327f00fd594eeb34656c0cd9fb2
-
SHA256
2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab
-
SHA512
c0e4e04ae624399fafd2fc72f57dc6551491c1786d69cb264ce3a86679cf33beac288f53a1de4d848f61bce4af2f4d27534470117cd820d52b8cd830cddcfdd6
-
SSDEEP
49152:E3g92xGqdwORv1cgQeWQ9I1iVXExCKt3XCgwRNs3pGDcGmZVIfO+MH:6/wGJpVUxCGwRNs3p36q
Static task
static1
Behavioral task
behavioral1
Sample
2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab.bin
-
Size
3.4MB
-
MD5
e7cedbfef280ceda133712e7cda8a6a9
-
SHA1
f7ecec07cbdab327f00fd594eeb34656c0cd9fb2
-
SHA256
2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab
-
SHA512
c0e4e04ae624399fafd2fc72f57dc6551491c1786d69cb264ce3a86679cf33beac288f53a1de4d848f61bce4af2f4d27534470117cd820d52b8cd830cddcfdd6
-
SSDEEP
49152:E3g92xGqdwORv1cgQeWQ9I1iVXExCKt3XCgwRNs3pGDcGmZVIfO+MH:6/wGJpVUxCGwRNs3p36q
-
A potential corporate email address has been identified in the URL: [email protected]
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-