General
-
Target
4f309b057a0465bfa98eeff9c39dcfb2.apk
-
Size
3.3MB
-
Sample
240701-krshaswaqj
-
MD5
4f309b057a0465bfa98eeff9c39dcfb2
-
SHA1
4d8de118f8db6ba1fcd91aa250c7c6093ffce703
-
SHA256
a3a36a2884e086145608b737c1d9c66798dc14983cad47203fe1fbdffbc33a71
-
SHA512
50400988c473b155b6789a394cf9018bed8fcd7a9cfbc879fa65321fab27429bfc7568b2f4fde55ee335f9e844bf9cdba05aaff3542ac59faec08c45c242c152
-
SSDEEP
98304:JTf6kkRqA2R0aAqzkkIOX5BaB06AcWfGzp0gWC:565RtWd/5M+69us
Static task
static1
Behavioral task
behavioral1
Sample
4f309b057a0465bfa98eeff9c39dcfb2.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4f309b057a0465bfa98eeff9c39dcfb2.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4f309b057a0465bfa98eeff9c39dcfb2.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
4f309b057a0465bfa98eeff9c39dcfb2.apk
-
Size
3.3MB
-
MD5
4f309b057a0465bfa98eeff9c39dcfb2
-
SHA1
4d8de118f8db6ba1fcd91aa250c7c6093ffce703
-
SHA256
a3a36a2884e086145608b737c1d9c66798dc14983cad47203fe1fbdffbc33a71
-
SHA512
50400988c473b155b6789a394cf9018bed8fcd7a9cfbc879fa65321fab27429bfc7568b2f4fde55ee335f9e844bf9cdba05aaff3542ac59faec08c45c242c152
-
SSDEEP
98304:JTf6kkRqA2R0aAqzkkIOX5BaB06AcWfGzp0gWC:565RtWd/5M+69us
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-