General
-
Target
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a.bin
-
Size
3.5MB
-
Sample
241120-1zet6strgv
-
MD5
58d91834a5e9b84300d94eb218aebe2d
-
SHA1
dee0a096d251bb21091f13cfff105f047349cc11
-
SHA256
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a
-
SHA512
fabf5db512b175e619185053dbc5a49bbed4b7f2c1bf74250ce006c1f288debede133fa677fc1f24b20f0fa12324d207ef0d55e861df97e8d272e6b1f36af32e
-
SSDEEP
98304:zrYhi7UkHvaV4TNtKIGgh8tuY0BhHNPpSi:fYheUkHvaV4TNtYpcBJp
Static task
static1
Behavioral task
behavioral1
Sample
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a.bin
-
Size
3.5MB
-
MD5
58d91834a5e9b84300d94eb218aebe2d
-
SHA1
dee0a096d251bb21091f13cfff105f047349cc11
-
SHA256
7978ef1f9d2c0fdcf9dab2ed56976e5a926c384c99f3dd48250a34b2a402379a
-
SHA512
fabf5db512b175e619185053dbc5a49bbed4b7f2c1bf74250ce006c1f288debede133fa677fc1f24b20f0fa12324d207ef0d55e861df97e8d272e6b1f36af32e
-
SSDEEP
98304:zrYhi7UkHvaV4TNtKIGgh8tuY0BhHNPpSi:fYheUkHvaV4TNtYpcBJp
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-