General
-
Target
Cine10Tv.V3.apk
-
Size
24.6MB
-
Sample
241110-n1zvhsvrhv
-
MD5
278b4bffd7f0149dca8cae0ed43ac3e9
-
SHA1
015111c9e37e4343cf8e0c1943d2a7785c254995
-
SHA256
8397687cece62b9c559fbc6031d9526ecd3b863c2f4f91b74af02edb951eb028
-
SHA512
8c1072ca042db9aa9d3b81e57873e280b7cce88a27af42f010d1e8dc865cb6bc2e4255f0ecaa29099ba3a30328d8182082631ce62fa49f435efbdb4573197462
-
SSDEEP
786432:PtyfPpifp+muDOalttZEtPe0BdBMgHOvxzRe/:PMZiomuK6tLCPtuvZC
Static task
static1
Behavioral task
behavioral1
Sample
Cine10Tv.V3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Cine10Tv.V3.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
Cine10Tv.V3.apk
-
Size
24.6MB
-
MD5
278b4bffd7f0149dca8cae0ed43ac3e9
-
SHA1
015111c9e37e4343cf8e0c1943d2a7785c254995
-
SHA256
8397687cece62b9c559fbc6031d9526ecd3b863c2f4f91b74af02edb951eb028
-
SHA512
8c1072ca042db9aa9d3b81e57873e280b7cce88a27af42f010d1e8dc865cb6bc2e4255f0ecaa29099ba3a30328d8182082631ce62fa49f435efbdb4573197462
-
SSDEEP
786432:PtyfPpifp+muDOalttZEtPe0BdBMgHOvxzRe/:PMZiomuK6tLCPtuvZC
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-