General
-
Target
8e429d7bd40d37e90fa6b7573c55ca207bbd0f8bd02ff7243f8608b6548fbf19.apk
-
Size
12.2MB
-
Sample
241117-qee94avmcn
-
MD5
9082d221e813e74c2842b503f1be4503
-
SHA1
827afdb34ca20e3fbcd9ebdd920a093d27fbe85d
-
SHA256
8e429d7bd40d37e90fa6b7573c55ca207bbd0f8bd02ff7243f8608b6548fbf19
-
SHA512
ff4cab110cc42bf652ddb8569a2ad294109edcd67d03775e7c60f37370ea418663173b38449f52c15ded7da7353524cea18bf54f4e37fea7533ce771bc44062f
-
SSDEEP
196608:btd7pyOZK06nrERViibWMPdJ2vS2/gD366qnPDsIlUdtgiZpqEcWtk/SE:br7E4H6rEfiMXdkS2/c6LPblUg
Behavioral task
behavioral1
Sample
8e429d7bd40d37e90fa6b7573c55ca207bbd0f8bd02ff7243f8608b6548fbf19.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8e429d7bd40d37e90fa6b7573c55ca207bbd0f8bd02ff7243f8608b6548fbf19.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
8e429d7bd40d37e90fa6b7573c55ca207bbd0f8bd02ff7243f8608b6548fbf19.apk
-
Size
12.2MB
-
MD5
9082d221e813e74c2842b503f1be4503
-
SHA1
827afdb34ca20e3fbcd9ebdd920a093d27fbe85d
-
SHA256
8e429d7bd40d37e90fa6b7573c55ca207bbd0f8bd02ff7243f8608b6548fbf19
-
SHA512
ff4cab110cc42bf652ddb8569a2ad294109edcd67d03775e7c60f37370ea418663173b38449f52c15ded7da7353524cea18bf54f4e37fea7533ce771bc44062f
-
SSDEEP
196608:btd7pyOZK06nrERViibWMPdJ2vS2/gD366qnPDsIlUdtgiZpqEcWtk/SE:br7E4H6rEfiMXdkS2/c6LPblUg
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
4System Checks
4