General
-
Target
sh.ppy.osulazer.apk
-
Size
215.0MB
-
Sample
250203-aaak2svlfn
-
MD5
a22ca5d3391931d7f4e602380da7c60f
-
SHA1
b5d80e4f458db8dcc65506194fc36642f03bd49a
-
SHA256
1ea11e37eed039b132147b7b5f58a52527e8d4b6936822348cc0db52de1d7dcc
-
SHA512
c55fdf6d1afc6072954469fb82dc2a5b555d51c948923d8012752326f2e6a0d61b4a562aaf489f9cdf7fa06fddca8422c610c0a31fbd308a56e737057a681d1e
-
SSDEEP
6291456:uHCLaPTVJqbqyI+GJQeQ0RAlry6h6bFGVHGA:uHlPvqbheYftL
Behavioral task
behavioral1
Sample
sh.ppy.osulazer.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
sh.ppy.osulazer.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
sh.ppy.osulazer.apk
-
Size
215.0MB
-
MD5
a22ca5d3391931d7f4e602380da7c60f
-
SHA1
b5d80e4f458db8dcc65506194fc36642f03bd49a
-
SHA256
1ea11e37eed039b132147b7b5f58a52527e8d4b6936822348cc0db52de1d7dcc
-
SHA512
c55fdf6d1afc6072954469fb82dc2a5b555d51c948923d8012752326f2e6a0d61b4a562aaf489f9cdf7fa06fddca8422c610c0a31fbd308a56e737057a681d1e
-
SSDEEP
6291456:uHCLaPTVJqbqyI+GJQeQ0RAlry6h6bFGVHGA:uHlPvqbheYftL
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-