General
-
Target
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a.bin
-
Size
3.9MB
-
Sample
250328-12t2wastf1
-
MD5
7c8b3c00973ca3958f4e41e8950cce35
-
SHA1
824a227d09917582c8ecf5594b62454931fdba22
-
SHA256
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a
-
SHA512
73b980b63bbdb97388cff1220deecfb507d903cda89ed3cde99a3f0a3dab67f49e43ae5ccb16642d0c33dc7eef99ddbd3f150f173b8cc9a1acbc7105b363a13b
-
SSDEEP
98304:2fZi2qb/g2nKAPQthA8Cm0IkxOLN9g2/Lo2PZtceey:s4h4j2l8SYY9E
Static task
static1
Behavioral task
behavioral1
Sample
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a.bin
-
Size
3.9MB
-
MD5
7c8b3c00973ca3958f4e41e8950cce35
-
SHA1
824a227d09917582c8ecf5594b62454931fdba22
-
SHA256
988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a
-
SHA512
73b980b63bbdb97388cff1220deecfb507d903cda89ed3cde99a3f0a3dab67f49e43ae5ccb16642d0c33dc7eef99ddbd3f150f173b8cc9a1acbc7105b363a13b
-
SSDEEP
98304:2fZi2qb/g2nKAPQthA8Cm0IkxOLN9g2/Lo2PZtceey:s4h4j2l8SYY9E
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-