General
-
Target
GpikTV_v1.1.6.apk
-
Size
6.1MB
-
Sample
241110-qckrssxflh
-
MD5
7f715c2212e1f85288053d00ffaf25f9
-
SHA1
2d44f1086ecbc055ca11fd703d6198d1b900b5a4
-
SHA256
89cba15d52851953fb91820c3248dd8914d86e3263e3d8d7b0bea0c05fe5405e
-
SHA512
464adfec0034d37ec58b1e4664efa7294e47ef68a0cd6a23f89602739a878d07d4156477413c78e449b858beadc3e78e0367f49a198fc3543bf7efb6a27e3333
-
SSDEEP
98304:vXKJJCOHnvVy54frQHikJ9IEFEoU7n+FHXY1H7EXxOtnBT+H1i8:C4+n9yFiaCZoMLlEhYnZOi8
Static task
static1
Behavioral task
behavioral1
Sample
GpikTV_v1.1.6.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
GpikTV_v1.1.6.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
GpikTV_v1.1.6.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
GpikTV_v1.1.6.apk
-
Size
6.1MB
-
MD5
7f715c2212e1f85288053d00ffaf25f9
-
SHA1
2d44f1086ecbc055ca11fd703d6198d1b900b5a4
-
SHA256
89cba15d52851953fb91820c3248dd8914d86e3263e3d8d7b0bea0c05fe5405e
-
SHA512
464adfec0034d37ec58b1e4664efa7294e47ef68a0cd6a23f89602739a878d07d4156477413c78e449b858beadc3e78e0367f49a198fc3543bf7efb6a27e3333
-
SSDEEP
98304:vXKJJCOHnvVy54frQHikJ9IEFEoU7n+FHXY1H7EXxOtnBT+H1i8:C4+n9yFiaCZoMLlEhYnZOi8
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Legitimate hosting services abused for malware hosting/C2
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-