General
-
Target
indus.credit.card.apk
-
Size
29.8MB
-
Sample
241114-qn258azemj
-
MD5
1f97c50d27a55b9f5b25186e5509d031
-
SHA1
3bafad160e86af9fa619db169950c439021f5902
-
SHA256
0f5568d9ea1197e88b22d042d9d2b39c505ba062c63bf74b909cef8041c97086
-
SHA512
2663b070ec25f95096c78cad25b9f8c889297817085fb101bbbaca7d1710e3046d4d81fd0a8e31d6db782139e248d73bb9b9d04952fbce6b397f4026ab99e539
-
SSDEEP
786432:ZWT5dT80ULSJ07Ib2gsc5Q9ReO3Tddh6norjQ/9b23V:ZWT7AuEIPl8eO5T/Q/9b6
Static task
static1
Behavioral task
behavioral1
Sample
indus.credit.card.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
indus.credit.card.apk
-
Size
29.8MB
-
MD5
1f97c50d27a55b9f5b25186e5509d031
-
SHA1
3bafad160e86af9fa619db169950c439021f5902
-
SHA256
0f5568d9ea1197e88b22d042d9d2b39c505ba062c63bf74b909cef8041c97086
-
SHA512
2663b070ec25f95096c78cad25b9f8c889297817085fb101bbbaca7d1710e3046d4d81fd0a8e31d6db782139e248d73bb9b9d04952fbce6b397f4026ab99e539
-
SSDEEP
786432:ZWT5dT80ULSJ07Ib2gsc5Q9ReO3Tddh6norjQ/9b23V:ZWT7AuEIPl8eO5T/Q/9b6
Score7/10-
Reads the content of the SMS messages.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-