General
-
Target
devices-tycoon-androeed.store-0-1727048296.apk
-
Size
70.7MB
-
Sample
241110-bp49msvrdx
-
MD5
22f99e46dea7f302e8efffdbbb74f67f
-
SHA1
fc0989813bc009bebeae78cc3472bf76287d6903
-
SHA256
c55f58a0a9262f7a009e30934e5f8ba8a967eee96cf6e835785371e0dd4240cd
-
SHA512
ff21fd985bbfa601c4258e8d3f94967a00becb0a8c7e72584dd401507fb04851fe695a6fc4020f14d4fbbfbe7ca1aa4de3a15d106554529ba3b81674d932e626
-
SSDEEP
1572864:e/SW3HCmgCMtY8EuH42DwnXL1MAiGRUUuQkYOwS:DW3HCPtY8E72yXL7itUuQxOwS
Static task
static1
Behavioral task
behavioral1
Sample
devices-tycoon-androeed.store-0-1727048296.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
devices-tycoon-androeed.store-0-1727048296.apk
-
Size
70.7MB
-
MD5
22f99e46dea7f302e8efffdbbb74f67f
-
SHA1
fc0989813bc009bebeae78cc3472bf76287d6903
-
SHA256
c55f58a0a9262f7a009e30934e5f8ba8a967eee96cf6e835785371e0dd4240cd
-
SHA512
ff21fd985bbfa601c4258e8d3f94967a00becb0a8c7e72584dd401507fb04851fe695a6fc4020f14d4fbbfbe7ca1aa4de3a15d106554529ba3b81674d932e626
-
SSDEEP
1572864:e/SW3HCmgCMtY8EuH42DwnXL1MAiGRUUuQkYOwS:DW3HCPtY8E72yXL7itUuQxOwS
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Checks the presence of a debugger
-