General
-
Target
Futbolplay.apk
-
Size
19.4MB
-
Sample
240630-rlqj3sygpd
-
MD5
58a29c8a32ef94dc7a57d34f7ba876ef
-
SHA1
8dfd50b7b4a6cfdf65304b54204d2b2b30d89701
-
SHA256
b551587ee971147907be2d9f15bda2c8eb6bccdaf90ff195aaef8bece6ba983c
-
SHA512
ba7e8d4cbed7c276c8dceef5878358bd3a717a6c4ee3213a79ef67cf1a7e3447fec8f178ef6d669085b73a48d47235ee10c21a0797fc9b717add5b1cb654fb98
-
SSDEEP
393216:kghITr8Du4lCg6pQJu2imVZBALfxccBOdQyYomhbPRISKP32N54Oxo1:Aruu4l6iZiCYPU8r5PR/KPMTxk
Static task
static1
Behavioral task
behavioral1
Sample
Futbolplay.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Futbolplay.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
Futbolplay.apk
-
Size
19.4MB
-
MD5
58a29c8a32ef94dc7a57d34f7ba876ef
-
SHA1
8dfd50b7b4a6cfdf65304b54204d2b2b30d89701
-
SHA256
b551587ee971147907be2d9f15bda2c8eb6bccdaf90ff195aaef8bece6ba983c
-
SHA512
ba7e8d4cbed7c276c8dceef5878358bd3a717a6c4ee3213a79ef67cf1a7e3447fec8f178ef6d669085b73a48d47235ee10c21a0797fc9b717add5b1cb654fb98
-
SSDEEP
393216:kghITr8Du4lCg6pQJu2imVZBALfxccBOdQyYomhbPRISKP32N54Oxo1:Aruu4l6iZiCYPU8r5PR/KPMTxk
-
Checks if the Android device is rooted.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-