General
-
Target
Balatro_0.2_noPairip.apk
-
Size
98.8MB
-
Sample
250209-pt6j6a1mgw
-
MD5
d325729cb9b678e2339289f1a6487321
-
SHA1
67472cce2e5e40433856e2faace5fd8d8b1b5e79
-
SHA256
7db297569faa599ff5a5163deb7b1c10cd3784cb1a4a9b5f7b99b49a0c1f1163
-
SHA512
84c575a2a2e2e8383afec402eab98958f39fc12bd033314a3bc62f08aac528a3b2d13308fde27386ee41f2cafba4f0fbc7a536d948cd9c6bc610511f39598a72
-
SSDEEP
1572864:6bZbPrp3CIF9SN2lrjId8QxqiaVN7GWgxzztFtLOmrqWVzGM7ndefdHczKfWe8u:6bPFU5d9RaTq9ZBDGMpe0DE
Static task
static1
Behavioral task
behavioral1
Sample
Balatro_0.2_noPairip.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
Balatro_0.2_noPairip.apk
-
Size
98.8MB
-
MD5
d325729cb9b678e2339289f1a6487321
-
SHA1
67472cce2e5e40433856e2faace5fd8d8b1b5e79
-
SHA256
7db297569faa599ff5a5163deb7b1c10cd3784cb1a4a9b5f7b99b49a0c1f1163
-
SHA512
84c575a2a2e2e8383afec402eab98958f39fc12bd033314a3bc62f08aac528a3b2d13308fde27386ee41f2cafba4f0fbc7a536d948cd9c6bc610511f39598a72
-
SSDEEP
1572864:6bZbPrp3CIF9SN2lrjId8QxqiaVN7GWgxzztFtLOmrqWVzGM7ndefdHczKfWe8u:6bPFU5d9RaTq9ZBDGMpe0DE
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Listens for changes in the sensor environment (might be used to detect emulation)
-