General
-
Target
243ea96b2f8f70abc127c8bc1759929e3ad9efc1dec5b51f5788e9896b6d516e
-
Size
2.9MB
-
Sample
220617-nl5gfsbgfl
-
MD5
5d892168472ed4a87a60721c02330f15
-
SHA1
97ead8dec0bf601ba452b9e45bb33cb4a3bf830f
-
SHA256
243ea96b2f8f70abc127c8bc1759929e3ad9efc1dec5b51f5788e9896b6d516e
-
SHA512
e8aa2aecbde4c0385b5027a0920cb4dd3d19267e2ef2155f74d8b90425697c7a5421f31a3d12ee5f6fb904ad82514c9de7f2d1e7d53e43f50aa2b179434ec60a
Static task
static1
Behavioral task
behavioral1
Sample
243ea96b2f8f70abc127c8bc1759929e3ad9efc1dec5b51f5788e9896b6d516e.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
243ea96b2f8f70abc127c8bc1759929e3ad9efc1dec5b51f5788e9896b6d516e.apk
Resource
android-x64-20220310-en
Malware Config
Targets
-
-
Target
243ea96b2f8f70abc127c8bc1759929e3ad9efc1dec5b51f5788e9896b6d516e
-
Size
2.9MB
-
MD5
5d892168472ed4a87a60721c02330f15
-
SHA1
97ead8dec0bf601ba452b9e45bb33cb4a3bf830f
-
SHA256
243ea96b2f8f70abc127c8bc1759929e3ad9efc1dec5b51f5788e9896b6d516e
-
SHA512
e8aa2aecbde4c0385b5027a0920cb4dd3d19267e2ef2155f74d8b90425697c7a5421f31a3d12ee5f6fb904ad82514c9de7f2d1e7d53e43f50aa2b179434ec60a
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-