Resubmissions
14-01-2025 05:44
250114-gfjt8szrbn 1014-01-2025 05:43
250114-ge4g9aykgt 1014-01-2025 05:39
250114-gctj9szqep 1014-01-2025 05:35
250114-f993vazqak 1014-01-2025 05:34
250114-f9l11szpgq 1014-01-2025 05:31
250114-f76yeayjcw 1014-01-2025 05:30
250114-f68evayjas 1014-01-2025 05:29
250114-f6m4xazpcq 1014-01-2025 05:27
250114-f5p7wazpbm 10General
-
Target
virusX.zip
-
Size
32.5MB
-
Sample
250114-f76yeayjcw
-
MD5
a58b72237a14d709c6eea04b73049210
-
SHA1
786a2d070ea75d7fd858ebd93869063fedd6d705
-
SHA256
51baf4bc48db631e887ded88c0beb05b7a2f6f26ad2d122ee7c6cca6678752f5
-
SHA512
978b868d4ce591570f722d167e14f2b6533d3b341bdaac1048fb3d1196ad26b2009269514d29b5aeb12aa75697ae556ebd3c88af1ed4ea00f8c83289fff7a9b9
-
SSDEEP
786432:xDWCPFc6LHxrdAxglUJMtJg9GzAl8g5lf/F9M6GvHzn9:sUzjxrdAxxJM+l8g5lDM6Gj9
Behavioral task
behavioral1
Sample
b3f23bdd3dea208f05de7a5b9ea928758187b3f2b0f4f5733c8bdb3298818ec0.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
b3f23bdd3dea208f05de7a5b9ea928758187b3f2b0f4f5733c8bdb3298818ec0.apk
-
Size
3.7MB
-
MD5
f17c846775fe7d69c25b1f9834ec31d9
-
SHA1
642e9c6595ed94cf6040c9a66e4431b04a62a2a3
-
SHA256
b3f23bdd3dea208f05de7a5b9ea928758187b3f2b0f4f5733c8bdb3298818ec0
-
SHA512
2f9883be40f1b9fda7ef9bd432c7d32e5adf6222e5bc9dbeed974f7e101a8c8af39f3bdd059fb0b83cb7e0d034f1ac85bc860bba30eb46b2da7f6d02657c70c9
-
SSDEEP
98304:qmVDDWjqPP2X1180Q046fgVPwLBqylSWFk5uYUbLCJrn:p3WjqX2l2046qPwLB/lS+kpUnu
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2