Resubmissions
14-01-2025 05:44
250114-gfjt8szrbn 1014-01-2025 05:43
250114-ge4g9aykgt 1014-01-2025 05:39
250114-gctj9szqep 1014-01-2025 05:35
250114-f993vazqak 1014-01-2025 05:34
250114-f9l11szpgq 1014-01-2025 05:31
250114-f76yeayjcw 1014-01-2025 05:30
250114-f68evayjas 1014-01-2025 05:29
250114-f6m4xazpcq 1014-01-2025 05:27
250114-f5p7wazpbm 10General
-
Target
virusX.zip
-
Size
32.5MB
-
Sample
250114-f5p7wazpbm
-
MD5
a58b72237a14d709c6eea04b73049210
-
SHA1
786a2d070ea75d7fd858ebd93869063fedd6d705
-
SHA256
51baf4bc48db631e887ded88c0beb05b7a2f6f26ad2d122ee7c6cca6678752f5
-
SHA512
978b868d4ce591570f722d167e14f2b6533d3b341bdaac1048fb3d1196ad26b2009269514d29b5aeb12aa75697ae556ebd3c88af1ed4ea00f8c83289fff7a9b9
-
SSDEEP
786432:xDWCPFc6LHxrdAxglUJMtJg9GzAl8g5lf/F9M6GvHzn9:sUzjxrdAxxJM+l8g5lDM6Gj9
Behavioral task
behavioral1
Sample
Stick War_ Legacy.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
Stick War_ Legacy.apk
-
Size
3.2MB
-
MD5
ae5770ecb741649cd470d645dd611843
-
SHA1
d6d29b4466c5139b9ea5b63d2b85150d6604abc5
-
SHA256
ba39a4b76ab656532003e560476b9a295df488f50195c6b9d7ac523b6d07aab4
-
SHA512
dda845e67dedf51508205f6aa7ffd8d19fcad0f0077178c71b8f65a96cb4096d3f326f52c081ea003f78703fdbbbff79f77b3618fd06717be67987627d0f524f
-
SSDEEP
98304:mO76p/xfKx1ppTyRwkrB0z+X0iXN9ALEjTRVShd:mi6FxfKxjdy66B0z+EiZnKT
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-