General
-
Target
escobar.apk
-
Size
2.0MB
-
Sample
220316-q2zl9aceeq
-
MD5
d57e1c11f915b874ef5c86cedb25abda
-
SHA1
22e943025f515a398b2f559c658a1a188d0d889f
-
SHA256
a9d1561ed0d23a5473d68069337e2f8e7862f7b72b74251eb63ccc883ba9459f
-
SHA512
2e8324559e46cb9f912eeb84b6e80a3838c71c4d045fd0a112aa3bea7fb8efdeb2ca03990a7189f5fec8d0a3f81fdaf2a98b8bce4edebc4afdc3813739bc8601
Static task
static1
Behavioral task
behavioral1
Sample
escobar.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
escobar.apk
Resource
android-x64-20220310-en
Malware Config
Targets
-
-
Target
escobar.apk
-
Size
2.0MB
-
MD5
d57e1c11f915b874ef5c86cedb25abda
-
SHA1
22e943025f515a398b2f559c658a1a188d0d889f
-
SHA256
a9d1561ed0d23a5473d68069337e2f8e7862f7b72b74251eb63ccc883ba9459f
-
SHA512
2e8324559e46cb9f912eeb84b6e80a3838c71c4d045fd0a112aa3bea7fb8efdeb2ca03990a7189f5fec8d0a3f81fdaf2a98b8bce4edebc4afdc3813739bc8601
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Removes a system notification.
-