General
-
Target
app-release.apk
-
Size
30.7MB
-
Sample
250328-s5w2msxzfz
-
MD5
8a890bc1243580758bd4f9ed4d818fe4
-
SHA1
a1a86fc76ef9f0656d88642fdcfbbaa02b673a55
-
SHA256
b2b59e5a765e763f196efea2c094698f5209faf8d6f614c66c36719990d28afb
-
SHA512
9d012e33154f99ec1ca258684d91968225ff1c09fe5500647965c99095b740540d3822dee6ef82c3e6607c51caa45354b7f95d0f868a0fdcc7976cbe8ec13030
-
SSDEEP
786432:iceiAME8+W58VrF/ABtAPr+HJde+tRLEZM+lmDfD2sTgkNGmiXwc7Fk:iBzM9tsYBa8JdZRLEZM+lVnmihFk
Static task
static1
Behavioral task
behavioral1
Sample
app-release.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
app-release.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
app-release.apk
-
Size
30.7MB
-
MD5
8a890bc1243580758bd4f9ed4d818fe4
-
SHA1
a1a86fc76ef9f0656d88642fdcfbbaa02b673a55
-
SHA256
b2b59e5a765e763f196efea2c094698f5209faf8d6f614c66c36719990d28afb
-
SHA512
9d012e33154f99ec1ca258684d91968225ff1c09fe5500647965c99095b740540d3822dee6ef82c3e6607c51caa45354b7f95d0f868a0fdcc7976cbe8ec13030
-
SSDEEP
786432:iceiAME8+W58VrF/ABtAPr+HJde+tRLEZM+lmDfD2sTgkNGmiXwc7Fk:iBzM9tsYBa8JdZRLEZM+lVnmihFk
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2