General
-
Target
e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775.bin
-
Size
2.5MB
-
Sample
240630-12x4jazhln
-
MD5
c50db87c26a020410ac4ee35bef6ae68
-
SHA1
00d31e21aa8b1b65f80e464ed01567ce0528bf6c
-
SHA256
e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775
-
SHA512
1866d019b17fb302ad083e8e1d54c6dc88956b96907b7326089f914e388fb4c3fcbab22ca058bd9f29d8b8f14d93a6faf9375618858d9a4fc3a49563872b1c50
-
SSDEEP
49152:MoGIErz29ASurd17S+mWuZYxlFHyJVQ2QbpzcqvganpqMIoTwrswYFpv:UIU2+SurjjugHbvOiwoTwrswY7
Static task
static1
Behavioral task
behavioral1
Sample
e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775.bin
-
Size
2.5MB
-
MD5
c50db87c26a020410ac4ee35bef6ae68
-
SHA1
00d31e21aa8b1b65f80e464ed01567ce0528bf6c
-
SHA256
e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775
-
SHA512
1866d019b17fb302ad083e8e1d54c6dc88956b96907b7326089f914e388fb4c3fcbab22ca058bd9f29d8b8f14d93a6faf9375618858d9a4fc3a49563872b1c50
-
SSDEEP
49152:MoGIErz29ASurd17S+mWuZYxlFHyJVQ2QbpzcqvganpqMIoTwrswYFpv:UIU2+SurjjugHbvOiwoTwrswY7
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-