General
-
Target
dc0fd48deff9420b8719f31538925fc709bd3e4a98c4cb27729329c01e97882f.zip
-
Size
3.4MB
-
Sample
250327-plhhcstny2
-
MD5
137fceef6afbc154c1e8cfd543d006ba
-
SHA1
5b47afeec97644ee26548a755423a3bcd85ffecd
-
SHA256
dc0fd48deff9420b8719f31538925fc709bd3e4a98c4cb27729329c01e97882f
-
SHA512
5722461abe959c2990edabb6e7fbec8c4a47b7804d4386f85257ef5075c65d93747ba9a3ba5f22f59eca4822d9bcb8757af22069b66d793762d3bcdea352a561
-
SSDEEP
98304:YjH6b621XSFA+p0wKuobjTtxWC4d0uwAUy:YaUA+p07uioum7
Static task
static1
Behavioral task
behavioral1
Sample
486d6a713d8c907df70a919729ac685328ab91a8977c2e352165640c4bd4d507.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
oscorp
5884JAANHE
Targets
-
-
Target
486d6a713d8c907df70a919729ac685328ab91a8977c2e352165640c4bd4d507.apk
-
Size
3.7MB
-
MD5
cee4b1fae8a45502d106a200593a9125
-
SHA1
627ef79b459b7e4c001ec298e7fae9f82f16fc97
-
SHA256
486d6a713d8c907df70a919729ac685328ab91a8977c2e352165640c4bd4d507
-
SHA512
8ce3d4580af1855f39bc4714490731ff4414b0d425dacfc64055b1fd0618495149d148fdcdcfab66c47542d63ab0c7af80a056a8f3faf506b5e0899526bd8087
-
SSDEEP
98304:S6YFtCZdYrO7+d00Vs18LnORE/TRZWT1wS/j3uoz:S6QCzYrOw00ayTPLTWT/5
-
Oscorp
Oscorp is an Android stealer that targets multiple financial information first seen in Feb 2021.
-
Oscorp family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Requests enabling of the accessibility settings.
-