General
-
Target
com.wg.xvideos.app-0.64-free.apk
-
Size
3.8MB
-
Sample
250508-w5d3lshp9t
-
MD5
93098ec609b39e535c26a8149a8162b7
-
SHA1
217e9a929d68cca7b621d8951a1ed049b843f16b
-
SHA256
aabe4e1c90e4b87ab586282ada58a58ff9b140f569bb91a1d60e618facb99ead
-
SHA512
519d1f96bc6e5bd68061a49fa640f90dd4ca6559092f0fdab65981f5fd8a47a6e1684d488da6336ec2fb24062644ad4d3159e79fbb1d5a2c760bd5292c1ee83c
-
SSDEEP
98304:6Ri/81f6xvLyvRw7Tx+Glm9aJRwZoR5EJB3n/JrSilfX:6PiFLyvO7Tx7lm9URwZSqJB3n/pd
Static task
static1
Behavioral task
behavioral1
Sample
com.wg.xvideos.app-0.64-free.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
com.wg.xvideos.app-0.64-free.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
com.wg.xvideos.app-0.64-free.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
com.wg.xvideos.app-0.64-free.apk
-
Size
3.8MB
-
MD5
93098ec609b39e535c26a8149a8162b7
-
SHA1
217e9a929d68cca7b621d8951a1ed049b843f16b
-
SHA256
aabe4e1c90e4b87ab586282ada58a58ff9b140f569bb91a1d60e618facb99ead
-
SHA512
519d1f96bc6e5bd68061a49fa640f90dd4ca6559092f0fdab65981f5fd8a47a6e1684d488da6336ec2fb24062644ad4d3159e79fbb1d5a2c760bd5292c1ee83c
-
SSDEEP
98304:6Ri/81f6xvLyvRw7Tx+Glm9aJRwZoR5EJB3n/JrSilfX:6PiFLyvO7Tx7lm9URwZSqJB3n/pd
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-