General
-
Target
afe2b037b268eea078a57b452b08381d4167836c30c2da81106fce086cb7e2bb
-
Size
27.0MB
-
Sample
220521-d891cacagm
-
MD5
7764cd2addb04df469c9143c50da7468
-
SHA1
dfde61fad332ed28a7e92be4c79c719d376d8a9a
-
SHA256
afe2b037b268eea078a57b452b08381d4167836c30c2da81106fce086cb7e2bb
-
SHA512
5c16450b1761d155e1f7d836616437563cad6ee60a0d04050eca803475e5c4faafc7c4a2df1360941cfb70a3a165abf8c87d75022a92e0d597b856c2f14bab0c
Static task
static1
Behavioral task
behavioral1
Sample
afe2b037b268eea078a57b452b08381d4167836c30c2da81106fce086cb7e2bb.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
afe2b037b268eea078a57b452b08381d4167836c30c2da81106fce086cb7e2bb.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
afe2b037b268eea078a57b452b08381d4167836c30c2da81106fce086cb7e2bb
-
Size
27.0MB
-
MD5
7764cd2addb04df469c9143c50da7468
-
SHA1
dfde61fad332ed28a7e92be4c79c719d376d8a9a
-
SHA256
afe2b037b268eea078a57b452b08381d4167836c30c2da81106fce086cb7e2bb
-
SHA512
5c16450b1761d155e1f7d836616437563cad6ee60a0d04050eca803475e5c4faafc7c4a2df1360941cfb70a3a165abf8c87d75022a92e0d597b856c2f14bab0c
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Removes a system notification.
-