General
-
Target
app.apk
-
Size
3.9MB
-
Sample
241209-dqnpdstngr
-
MD5
37847a27b715877659f6157063a1f079
-
SHA1
657bbcac517147fe166139aa803578baa49b92f3
-
SHA256
f81b1cbac0fc3981660cf69031b4020a67ffaf0874391385c67e439c89b23a6d
-
SHA512
83f450794aa437dd61e3f92f9f0236f773b110cb8e99650f2aeb5f86ccf2b7496ee5f035c3c93d758b1f55b1e224a077e7e816147ebbb38a11051cbfe80f3ef6
-
SSDEEP
98304:7m9niXwVISnclTNS4zD1I4IQ8genjhaAMVf3LWO/:7Oni8ISn0TNv1I7ZapaO/
Behavioral task
behavioral1
Sample
app.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
app.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
app.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
app.apk
-
Size
3.9MB
-
MD5
37847a27b715877659f6157063a1f079
-
SHA1
657bbcac517147fe166139aa803578baa49b92f3
-
SHA256
f81b1cbac0fc3981660cf69031b4020a67ffaf0874391385c67e439c89b23a6d
-
SHA512
83f450794aa437dd61e3f92f9f0236f773b110cb8e99650f2aeb5f86ccf2b7496ee5f035c3c93d758b1f55b1e224a077e7e816147ebbb38a11051cbfe80f3ef6
-
SSDEEP
98304:7m9niXwVISnclTNS4zD1I4IQ8genjhaAMVf3LWO/:7Oni8ISn0TNv1I7ZapaO/
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-