General
-
Target
JokesPhone.apk
-
Size
8.3MB
-
Sample
250508-vqej6atvht
-
MD5
617d8eba8f639c22b886ba6b32005cb7
-
SHA1
88abe3cc6dfff69916f55e02b97dd762ed450a3f
-
SHA256
bab68939362d86f4748350c4cccec652ff656ca34cd2df63d239c8debe3dc7a1
-
SHA512
e92684cf493c02ce5e87f5383e2e974204363231300eb6ce1b86e079493469adaf40cc8fb1976766939f9a56ca8f9605b6c8f03fe5cbd1e82cc17360190c82a0
-
SSDEEP
196608:ZB66xcLC3pAeO9efol1y8FyglJIDMmHjlIxzyPTgPbTH:ZvEXzjUDFAzgTo
Static task
static1
Behavioral task
behavioral1
Sample
JokesPhone.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
JokesPhone.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
JokesPhone.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
JokesPhone.apk
-
Size
8.3MB
-
MD5
617d8eba8f639c22b886ba6b32005cb7
-
SHA1
88abe3cc6dfff69916f55e02b97dd762ed450a3f
-
SHA256
bab68939362d86f4748350c4cccec652ff656ca34cd2df63d239c8debe3dc7a1
-
SHA512
e92684cf493c02ce5e87f5383e2e974204363231300eb6ce1b86e079493469adaf40cc8fb1976766939f9a56ca8f9605b6c8f03fe5cbd1e82cc17360190c82a0
-
SSDEEP
196608:ZB66xcLC3pAeO9efol1y8FyglJIDMmHjlIxzyPTgPbTH:ZvEXzjUDFAzgTo
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-