General
-
Target
Balatro-v0-3-patched.apk
-
Size
60.4MB
-
Sample
241119-tjf9qssqeq
-
MD5
4565a17ee2d90cd0084235d8850e71ad
-
SHA1
917a14cc8ad56ea8ffb5871f6b71518690225228
-
SHA256
83db3f3edb59cdd7e4f1ce5e1716bd8a7b5889655de59a616fb814ec4dc0db0f
-
SHA512
f01c2bed2bebd42bb10cac1b7609ff27ee48506337f9de7c143a837ec01fa4ee1d5a9b62a611dd8741a9d49e63a760cd12da16069903a143958bd0c20ba6c4ff
-
SSDEEP
1572864:z695crbQZbPrpyCIF9Sw2QrjIs8QsqiaVNPI+gxN:W9WrbQyFXosoRaTgVX
Static task
static1
Behavioral task
behavioral1
Sample
Balatro-v0-3-patched.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
Balatro-v0-3-patched.apk
-
Size
60.4MB
-
MD5
4565a17ee2d90cd0084235d8850e71ad
-
SHA1
917a14cc8ad56ea8ffb5871f6b71518690225228
-
SHA256
83db3f3edb59cdd7e4f1ce5e1716bd8a7b5889655de59a616fb814ec4dc0db0f
-
SHA512
f01c2bed2bebd42bb10cac1b7609ff27ee48506337f9de7c143a837ec01fa4ee1d5a9b62a611dd8741a9d49e63a760cd12da16069903a143958bd0c20ba6c4ff
-
SSDEEP
1572864:z695crbQZbPrpyCIF9Sw2QrjIs8QsqiaVNPI+gxN:W9WrbQyFXosoRaTgVX
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Listens for changes in the sensor environment (might be used to detect emulation)
-