General
-
Target
c2a18315f3381d3c05cb53f9474052970cada450438e27f36a91c01862edda98.bin
-
Size
4.5MB
-
Sample
241107-1zn3vazajq
-
MD5
212288cf28c6a97da1a5d1f6b5e74306
-
SHA1
4461a4ea2900aef9eaddf5318d06866096997411
-
SHA256
c2a18315f3381d3c05cb53f9474052970cada450438e27f36a91c01862edda98
-
SHA512
ec6c6f011c9b4c4748cd881b27de23707269080c8f75024975a0a7903cc200e1bf59d656266c7f7c3822ef1ff08ef829ffe6015d376de2efceb380cadfe20b65
-
SSDEEP
98304:y/ucAsjWi2aIgr0wHgK1rNTPBEyhfkvB4/IcG+Sp4q5VNe:y/uojW+N3d/jfEj+88
Static task
static1
Behavioral task
behavioral1
Sample
c2a18315f3381d3c05cb53f9474052970cada450438e27f36a91c01862edda98.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c2a18315f3381d3c05cb53f9474052970cada450438e27f36a91c01862edda98.apk
Resource
android-x64-20240910-en
Malware Config
Targets
-
-
Target
c2a18315f3381d3c05cb53f9474052970cada450438e27f36a91c01862edda98.bin
-
Size
4.5MB
-
MD5
212288cf28c6a97da1a5d1f6b5e74306
-
SHA1
4461a4ea2900aef9eaddf5318d06866096997411
-
SHA256
c2a18315f3381d3c05cb53f9474052970cada450438e27f36a91c01862edda98
-
SHA512
ec6c6f011c9b4c4748cd881b27de23707269080c8f75024975a0a7903cc200e1bf59d656266c7f7c3822ef1ff08ef829ffe6015d376de2efceb380cadfe20b65
-
SSDEEP
98304:y/ucAsjWi2aIgr0wHgK1rNTPBEyhfkvB4/IcG+Sp4q5VNe:y/uojW+N3d/jfEj+88
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-