General
-
Target
Futv.apk
-
Size
29.0MB
-
Sample
250328-srmwtaxycv
-
MD5
cda3d5066b51df1af4c02f768e20ebe7
-
SHA1
1a55361e65bf968683cfbc3f530e9674e2e03850
-
SHA256
908e211ca738bb22eab7ccc03dda70bf6b9c3e163efcde35243e11b26bb5af44
-
SHA512
c48ec0f49e2bbf086c37aa0a785c1ecf986fcae3db87c753a186c7983a8b48603bd39fc3a53ad8b4f17c38ed967d4fd05249ca1099dc0846e2cccfac24bf803d
-
SSDEEP
786432:mszZwtOpV7NKKWErgqYJ5xW6nsp2o8Nihr5svKQbkEZ:mstwCTf0pJTJnsp2b05s5bnZ
Static task
static1
Behavioral task
behavioral1
Sample
Futv.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
Futv.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
Futv.apk
-
Size
29.0MB
-
MD5
cda3d5066b51df1af4c02f768e20ebe7
-
SHA1
1a55361e65bf968683cfbc3f530e9674e2e03850
-
SHA256
908e211ca738bb22eab7ccc03dda70bf6b9c3e163efcde35243e11b26bb5af44
-
SHA512
c48ec0f49e2bbf086c37aa0a785c1ecf986fcae3db87c753a186c7983a8b48603bd39fc3a53ad8b4f17c38ed967d4fd05249ca1099dc0846e2cccfac24bf803d
-
SSDEEP
786432:mszZwtOpV7NKKWErgqYJ5xW6nsp2o8Nihr5svKQbkEZ:mstwCTf0pJTJnsp2b05s5bnZ
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-