General
-
Target
Blindstory_for_Instagram-2.1.16.apk
-
Size
7.5MB
-
Sample
240701-1dkhja1cne
-
MD5
6c99a18836f9cc407e3eb8309f738772
-
SHA1
706adfa9ecff21ea8d3f6290d65de598ce88bdc9
-
SHA256
feec23e673addca7ea7cd610e7955627910a7528790b2ca7d43a1efb55d35a07
-
SHA512
a813d52d320ea34054dd745d2933ab8bdf27fceb40596d93ea5d99f5f0551c8813319db1c93c66c35a25cc740817c4a9da1f387545e55d99a80af7bf581c5467
-
SSDEEP
196608:4/erRDgGEBY+EWPFcPC/Nj/j7FJzoxTnCJHBX0O:4mrVEkPUrYhnCJHBXB
Static task
static1
Behavioral task
behavioral1
Sample
Blindstory_for_Instagram-2.1.16.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Blindstory_for_Instagram-2.1.16.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
Blindstory_for_Instagram-2.1.16.apk
-
Size
7.5MB
-
MD5
6c99a18836f9cc407e3eb8309f738772
-
SHA1
706adfa9ecff21ea8d3f6290d65de598ce88bdc9
-
SHA256
feec23e673addca7ea7cd610e7955627910a7528790b2ca7d43a1efb55d35a07
-
SHA512
a813d52d320ea34054dd745d2933ab8bdf27fceb40596d93ea5d99f5f0551c8813319db1c93c66c35a25cc740817c4a9da1f387545e55d99a80af7bf581c5467
-
SSDEEP
196608:4/erRDgGEBY+EWPFcPC/Nj/j7FJzoxTnCJHBX0O:4mrVEkPUrYhnCJHBXB
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-