General
-
Target
NSLauncher150.apk
-
Size
6.1MB
-
Sample
241112-r3wsestmc1
-
MD5
11236ed2153d55904be6b22405d04fd8
-
SHA1
e981c34c4436ff41090a3698e0f6b921b4568288
-
SHA256
4594f229ca766001a165fb99ff851716f2458f5f7d36382062ba45a3e3b82783
-
SHA512
f07b7e0077b68d895f60c5a73514c11f2e5a3dd7fdfc15ab4d79b788f6ba234e9d39d2f17bd6e07c9ebfe8bbf89c06beead97372c092716e33b56205e763ce94
-
SSDEEP
196608:Jh5EH0TFl5voGmNCXkjVcH8th+ve47WIP5/mUAFG:o0JQGJWtMqIx/mUAI
Static task
static1
Behavioral task
behavioral1
Sample
NSLauncher150.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
NSLauncher150.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
NSLauncher150.apk
-
Size
6.1MB
-
MD5
11236ed2153d55904be6b22405d04fd8
-
SHA1
e981c34c4436ff41090a3698e0f6b921b4568288
-
SHA256
4594f229ca766001a165fb99ff851716f2458f5f7d36382062ba45a3e3b82783
-
SHA512
f07b7e0077b68d895f60c5a73514c11f2e5a3dd7fdfc15ab4d79b788f6ba234e9d39d2f17bd6e07c9ebfe8bbf89c06beead97372c092716e33b56205e763ce94
-
SSDEEP
196608:Jh5EH0TFl5voGmNCXkjVcH8th+ve47WIP5/mUAFG:o0JQGJWtMqIx/mUAI
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-