General
-
Target
build.s.apk
-
Size
267KB
-
Sample
241206-s8rakavmcz
-
MD5
5d75e747ee6c22e97bb8b6583c613c89
-
SHA1
e6dd14937e631b86fa9cf52e46c5b875a772a5ee
-
SHA256
057689e28c35811575811beaa1fa07bdc0130188f4590d286a564a0236060048
-
SHA512
00c5dff37a9a550d6149caa5e11cf89fee4970e16e8363d133f25f1b1f99443ffc54e36e8485dd93ef48481328efb35963112896f5d98400bd02b35e77573d66
-
SSDEEP
6144:VAqOHJbQC/0BbaRWSoTlA87mhYrIZFjllLGvNv90ku:VAfJc4NUA8TI3llLo9A
Behavioral task
behavioral1
Sample
build.s.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
build.s.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
build.s.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
ahmyth
http://51.20.2.165:3001
Targets
-
-
Target
build.s.apk
-
Size
267KB
-
MD5
5d75e747ee6c22e97bb8b6583c613c89
-
SHA1
e6dd14937e631b86fa9cf52e46c5b875a772a5ee
-
SHA256
057689e28c35811575811beaa1fa07bdc0130188f4590d286a564a0236060048
-
SHA512
00c5dff37a9a550d6149caa5e11cf89fee4970e16e8363d133f25f1b1f99443ffc54e36e8485dd93ef48481328efb35963112896f5d98400bd02b35e77573d66
-
SSDEEP
6144:VAqOHJbQC/0BbaRWSoTlA87mhYrIZFjllLGvNv90ku:VAfJc4NUA8TI3llLo9A
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-