General
-
Target
f9f4e2276c241659da8988e5f825696f1f4767650aace15d1a942385444f4321
-
Size
9.3MB
-
Sample
250203-kwb14swqct
-
MD5
83cc7472eb4efc947f3d7c1ebd410e85
-
SHA1
3a53e523f11f92583a52bdfbf0295ce07b825108
-
SHA256
f9f4e2276c241659da8988e5f825696f1f4767650aace15d1a942385444f4321
-
SHA512
a21e74d215ea1b9102d4347c5ac792c2f0b10c6164c9a4f1fd27d8d83b626bc3a8ce9dbdf5128fe69c3d1bad63e044ba853f37b13f0e486828a1c174364bd4ee
-
SSDEEP
196608:A4lFVbU5pQTOnctr8s0JCASGGS1XVDRAKuQ8bgPTPR/J+JJkQKQgJtj:lX2kOctgsNGGS1XdSKKg7PRgJJitj
Static task
static1
Behavioral task
behavioral1
Sample
f9f4e2276c241659da8988e5f825696f1f4767650aace15d1a942385444f4321.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f9f4e2276c241659da8988e5f825696f1f4767650aace15d1a942385444f4321.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f9f4e2276c241659da8988e5f825696f1f4767650aace15d1a942385444f4321.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
lebezewa.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
lebezewa.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
lebezewa.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
f9f4e2276c241659da8988e5f825696f1f4767650aace15d1a942385444f4321
-
Size
9.3MB
-
MD5
83cc7472eb4efc947f3d7c1ebd410e85
-
SHA1
3a53e523f11f92583a52bdfbf0295ce07b825108
-
SHA256
f9f4e2276c241659da8988e5f825696f1f4767650aace15d1a942385444f4321
-
SHA512
a21e74d215ea1b9102d4347c5ac792c2f0b10c6164c9a4f1fd27d8d83b626bc3a8ce9dbdf5128fe69c3d1bad63e044ba853f37b13f0e486828a1c174364bd4ee
-
SSDEEP
196608:A4lFVbU5pQTOnctr8s0JCASGGS1XVDRAKuQ8bgPTPR/J+JJkQKQgJtj:lX2kOctgsNGGS1XdSKKg7PRgJJitj
-
Antidot family
-
Antidot payload
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks the application is allowed to request package installs through the package installer
Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).
-
Queries the mobile country code (MCC)
-
Requests allowing to install additional applications from unknown sources.
-
-
-
Target
lebezewa
-
Size
9.7MB
-
MD5
0772b1116df1586b419acfbff9f8d96c
-
SHA1
827f307ebf5f3abaedc31645b5ec43203cbef72b
-
SHA256
85f24e29fc5f68f2a3a456fd749e887958758821e6f6512fbaee2f54b6bfc0e5
-
SHA512
95199611de6c507b54bf7bc162c5e8cc5543a215c08d7cc04ec1ab4ddfce50da66a24e5a58e4d43cba5eec0af3f0469bef81b54ee342fa24434ac9a5fa2cee1d
-
SSDEEP
98304:Fo/KrqB9EBvkB9ph9JyArVO2jmN9hSjGUI+YJqob5POoeT0wUar+qe+7eS3N8H2J:e9EBva9HyhAiqOA09qb7Rt
-
Antidot family
-
Antidot payload
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Requests uninstalling the application.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1