General
-
Target
c70e660b21bd4a107b64f265df7e43fddc8344067854edfc1fd461372f5e2b10.bin
-
Size
4.2MB
-
Sample
241227-1ynexs1mal
-
MD5
c5411f1964b7feaa97e4c85efdca76d2
-
SHA1
4cbe7476eec9f6be2f33199d4bac39a2eccf7373
-
SHA256
c70e660b21bd4a107b64f265df7e43fddc8344067854edfc1fd461372f5e2b10
-
SHA512
eafd69dfc004b623c391b0c5074231a5b820b7e8564e623fef1fb09586db5c90fd4fc327eeb95b1bd4c65ad07224431618e0dc0481b2788befefc1d3e43801ba
-
SSDEEP
49152:QsJGcFv75HdJuvjL95LHlsyt8pHLPqZatReywsWWu75vo/KrDTZ6:RJBFAjLTKqZa2sWWu75o/KrDTZ6
Behavioral task
behavioral1
Sample
c70e660b21bd4a107b64f265df7e43fddc8344067854edfc1fd461372f5e2b10.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
c70e660b21bd4a107b64f265df7e43fddc8344067854edfc1fd461372f5e2b10.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c70e660b21bd4a107b64f265df7e43fddc8344067854edfc1fd461372f5e2b10.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
c70e660b21bd4a107b64f265df7e43fddc8344067854edfc1fd461372f5e2b10.bin
-
Size
4.2MB
-
MD5
c5411f1964b7feaa97e4c85efdca76d2
-
SHA1
4cbe7476eec9f6be2f33199d4bac39a2eccf7373
-
SHA256
c70e660b21bd4a107b64f265df7e43fddc8344067854edfc1fd461372f5e2b10
-
SHA512
eafd69dfc004b623c391b0c5074231a5b820b7e8564e623fef1fb09586db5c90fd4fc327eeb95b1bd4c65ad07224431618e0dc0481b2788befefc1d3e43801ba
-
SSDEEP
49152:QsJGcFv75HdJuvjL95LHlsyt8pHLPqZatReywsWWu75vo/KrDTZ6:RJBFAjLTKqZa2sWWu75o/KrDTZ6
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-