General
-
Target
com-soft24hours-dictionaries-dictionary24-16001014-50888794-a78f4c3ba940ecbeed3af47188762410.apk
-
Size
11.4MB
-
Sample
250510-g9v5cswny9
-
MD5
a78f4c3ba940ecbeed3af47188762410
-
SHA1
1a3bac17f4fa23e07884c5af4ce0ee19d81846a3
-
SHA256
098d02a237a10379b51354c4ddced889c0ee582b8e3bd72d6e1454a7b92be136
-
SHA512
4f0fcb2a5eeb0aad6c52c1a45ba0151496ac6fce0360c3edde70c68d55c67a64aeb9158a7f83fbe8d826735d1568543f8da0b1f1bbe8daad20016ea4d8004610
-
SSDEEP
196608:bPleQUJ6derrm0vEhzoLT19URfMxuAmipNXxQBYMOkVOak5gNTlCP0Bw6g2klGEk:JeQ3e3m0choLT7Mf+VmiN/rkUKJlrwqH
Static task
static1
Behavioral task
behavioral1
Sample
com-soft24hours-dictionaries-dictionary24-16001014-50888794-a78f4c3ba940ecbeed3af47188762410.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral2
Sample
com-soft24hours-dictionaries-dictionary24-16001014-50888794-a78f4c3ba940ecbeed3af47188762410.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral3
Sample
com-soft24hours-dictionaries-dictionary24-16001014-50888794-a78f4c3ba940ecbeed3af47188762410.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
com-soft24hours-dictionaries-dictionary24-16001014-50888794-a78f4c3ba940ecbeed3af47188762410.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
com-soft24hours-dictionaries-dictionary24-16001014-50888794-a78f4c3ba940ecbeed3af47188762410.apk
-
Size
11.4MB
-
MD5
a78f4c3ba940ecbeed3af47188762410
-
SHA1
1a3bac17f4fa23e07884c5af4ce0ee19d81846a3
-
SHA256
098d02a237a10379b51354c4ddced889c0ee582b8e3bd72d6e1454a7b92be136
-
SHA512
4f0fcb2a5eeb0aad6c52c1a45ba0151496ac6fce0360c3edde70c68d55c67a64aeb9158a7f83fbe8d826735d1568543f8da0b1f1bbe8daad20016ea4d8004610
-
SSDEEP
196608:bPleQUJ6derrm0vEhzoLT19URfMxuAmipNXxQBYMOkVOak5gNTlCP0Bw6g2klGEk:JeQ3e3m0choLT7Mf+VmiN/rkUKJlrwqH
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v16
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2