General
-
Target
5ac0516a1c4876afaef78a9463a5311e250f780563924ce36518621906ac9451.bin
-
Size
4.5MB
-
Sample
250104-1yfp3szkct
-
MD5
7de05fc6e00db0fe4b5054fc55be0c2e
-
SHA1
8f3c46b091e54c1aaba0dacdd2133b655b4a804f
-
SHA256
5ac0516a1c4876afaef78a9463a5311e250f780563924ce36518621906ac9451
-
SHA512
2d36d4353992a4350c9c0e44e0da19e19ea244f33aa6dd5504904d7151bed316a9c82b8e6a2a9c53ca080b06486b02d816476ecbe0c196893c7ab5095b0345b4
-
SSDEEP
98304:XMTwrB/orDVlA4MSYGnOohCLLowWdBnyL+lyxgId3:9orD3dqTWXlyxv3
Behavioral task
behavioral1
Sample
5ac0516a1c4876afaef78a9463a5311e250f780563924ce36518621906ac9451.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5ac0516a1c4876afaef78a9463a5311e250f780563924ce36518621906ac9451.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
5ac0516a1c4876afaef78a9463a5311e250f780563924ce36518621906ac9451.bin
-
Size
4.5MB
-
MD5
7de05fc6e00db0fe4b5054fc55be0c2e
-
SHA1
8f3c46b091e54c1aaba0dacdd2133b655b4a804f
-
SHA256
5ac0516a1c4876afaef78a9463a5311e250f780563924ce36518621906ac9451
-
SHA512
2d36d4353992a4350c9c0e44e0da19e19ea244f33aa6dd5504904d7151bed316a9c82b8e6a2a9c53ca080b06486b02d816476ecbe0c196893c7ab5095b0345b4
-
SSDEEP
98304:XMTwrB/orDVlA4MSYGnOohCLLowWdBnyL+lyxgId3:9orD3dqTWXlyxv3
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2