General
-
Target
B34CFEEC76B6359E849F92003E2DF6D756A46A2C73EA4C334BECB7B53BD9EAA8.apk
-
Size
14.1MB
-
Sample
220715-qacneabggl
-
MD5
a6c412c2e266039f2d4a8096b7013f77
-
SHA1
6a206b4c26f3a2ed1c4ca494a81f18577e68456e
-
SHA256
b34cfeec76b6359e849f92003e2df6d756a46a2c73ea4c334becb7b53bd9eaa8
-
SHA512
0096e8950b2633c8bd8133fbc11ad93af72426da55e03159793d881d3746f8212cd5cc74ad4ca3a36e64618ae90c401add350194af85accdd9d9fed83421a509
Static task
static1
Behavioral task
behavioral1
Sample
B34CFEEC76B6359E849F92003E2DF6D756A46A2C73EA4C334BECB7B53BD9EAA8.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
B34CFEEC76B6359E849F92003E2DF6D756A46A2C73EA4C334BECB7B53BD9EAA8.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
B34CFEEC76B6359E849F92003E2DF6D756A46A2C73EA4C334BECB7B53BD9EAA8.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
B34CFEEC76B6359E849F92003E2DF6D756A46A2C73EA4C334BECB7B53BD9EAA8.apk
-
Size
14.1MB
-
MD5
a6c412c2e266039f2d4a8096b7013f77
-
SHA1
6a206b4c26f3a2ed1c4ca494a81f18577e68456e
-
SHA256
b34cfeec76b6359e849f92003e2df6d756a46a2c73ea4c334becb7b53bd9eaa8
-
SHA512
0096e8950b2633c8bd8133fbc11ad93af72426da55e03159793d881d3746f8212cd5cc74ad4ca3a36e64618ae90c401add350194af85accdd9d9fed83421a509
Score10/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-