General
-
Target
ff20adaab7f4ac0834fb9c5bb2b484dacf725a437b33c7d31f76f8a3325fade9.bin
-
Size
28KB
-
Sample
241120-1yxnlatrfw
-
MD5
2ec64f6be9fb942cb60f2cb816647b3f
-
SHA1
ae1302d3431da27df1a50dffda57b7e9921fdf8f
-
SHA256
ff20adaab7f4ac0834fb9c5bb2b484dacf725a437b33c7d31f76f8a3325fade9
-
SHA512
f625809888fdb34a96c43c4f58631adc8156bb1ea7c7125ee03522d0880a3f4862e56362c79ef57abd200ca7f5314d1199ba8300290d1590b9cd70981f8b63b7
-
SSDEEP
384:QDxMtOjlahKidH8Tgi2nH3hGH909QRkz3P9DRkdnt6sgKQ7eMejvQI4:maPz58Tgi2nHkd09QRcVDR63Qf
Static task
static1
Behavioral task
behavioral1
Sample
ff20adaab7f4ac0834fb9c5bb2b484dacf725a437b33c7d31f76f8a3325fade9.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ff20adaab7f4ac0834fb9c5bb2b484dacf725a437b33c7d31f76f8a3325fade9.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ff20adaab7f4ac0834fb9c5bb2b484dacf725a437b33c7d31f76f8a3325fade9.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
ff20adaab7f4ac0834fb9c5bb2b484dacf725a437b33c7d31f76f8a3325fade9.bin
-
Size
28KB
-
MD5
2ec64f6be9fb942cb60f2cb816647b3f
-
SHA1
ae1302d3431da27df1a50dffda57b7e9921fdf8f
-
SHA256
ff20adaab7f4ac0834fb9c5bb2b484dacf725a437b33c7d31f76f8a3325fade9
-
SHA512
f625809888fdb34a96c43c4f58631adc8156bb1ea7c7125ee03522d0880a3f4862e56362c79ef57abd200ca7f5314d1199ba8300290d1590b9cd70981f8b63b7
-
SSDEEP
384:QDxMtOjlahKidH8Tgi2nH3hGH909QRkz3P9DRkdnt6sgKQ7eMejvQI4:maPz58Tgi2nHkd09QRcVDR63Qf
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-