General
-
Target
tpa.apk
-
Size
11.4MB
-
Sample
250328-vybs8syyex
-
MD5
f298aaadbd4176baaa62ab84f8268685
-
SHA1
55c04a5a2f5937ac58c8627186f69d2d237bafe0
-
SHA256
5c8c709cf8902859edf69ff3999a13277668869fcd5efe020e1e520a2d099623
-
SHA512
2729a2aa057dbf9792139faed30bb2ec0d9749c2606c59b181ec28f9e524c3acb74b364a521f1cb169a0cacda6fa7dec6618215a673d36cdc4b492e1d9b5cadd
-
SSDEEP
196608:b4WDPHQgvI4N8DDtoQtm3O2PgZPD9VlvOcggldJb9eXKHpc7m5WfBQq65w:b4+HQgvbOtoQtxy4b9vOGjJb9Q7Yq6u
Static task
static1
Behavioral task
behavioral1
Sample
tpa.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
tpa.apk
-
Size
11.4MB
-
MD5
f298aaadbd4176baaa62ab84f8268685
-
SHA1
55c04a5a2f5937ac58c8627186f69d2d237bafe0
-
SHA256
5c8c709cf8902859edf69ff3999a13277668869fcd5efe020e1e520a2d099623
-
SHA512
2729a2aa057dbf9792139faed30bb2ec0d9749c2606c59b181ec28f9e524c3acb74b364a521f1cb169a0cacda6fa7dec6618215a673d36cdc4b492e1d9b5cadd
-
SSDEEP
196608:b4WDPHQgvI4N8DDtoQtm3O2PgZPD9VlvOcggldJb9eXKHpc7m5WfBQq65w:b4+HQgvbOtoQtxy4b9vOGjJb9Q7Yq6u
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-