General
-
Target
3ee1170d50a3c97217efda346c4bee2d748b9375226dd0c1df87ffc93eb4a431
-
Size
435KB
-
Sample
220701-e53brscbfp
-
MD5
a45c4013f641581b3087a460d22798cf
-
SHA1
bcfdc6f8026859719a57b30696c3054f66f51b3c
-
SHA256
3ee1170d50a3c97217efda346c4bee2d748b9375226dd0c1df87ffc93eb4a431
-
SHA512
0f3421997456187fdd89f9b174dcdf0ad33d486eedeb22816fec68f0ef28a07962c95a01e6f90b8832877387be74c819f725beeef3e4c41626c5f551702dac99
Static task
static1
Behavioral task
behavioral1
Sample
3ee1170d50a3c97217efda346c4bee2d748b9375226dd0c1df87ffc93eb4a431.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
3ee1170d50a3c97217efda346c4bee2d748b9375226dd0c1df87ffc93eb4a431.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
3ee1170d50a3c97217efda346c4bee2d748b9375226dd0c1df87ffc93eb4a431.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
3ee1170d50a3c97217efda346c4bee2d748b9375226dd0c1df87ffc93eb4a431
-
Size
435KB
-
MD5
a45c4013f641581b3087a460d22798cf
-
SHA1
bcfdc6f8026859719a57b30696c3054f66f51b3c
-
SHA256
3ee1170d50a3c97217efda346c4bee2d748b9375226dd0c1df87ffc93eb4a431
-
SHA512
0f3421997456187fdd89f9b174dcdf0ad33d486eedeb22816fec68f0ef28a07962c95a01e6f90b8832877387be74c819f725beeef3e4c41626c5f551702dac99
Score7/10-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Uses Crypto APIs (Might try to encrypt user data).
-