General
-
Target
0EE19BCC2B664AA10892F8E0A0AAEF9E37FFA4F8F9CBAE03C5CD1CA2406FB42F.apk
-
Size
29.3MB
-
Sample
220715-qaxnksaff3
-
MD5
37a3e8b3d977a930214ec10f6a793537
-
SHA1
b31dde48fcbc6b02c28c4cbebb3cdf8014d0d5ef
-
SHA256
0ee19bcc2b664aa10892f8e0a0aaef9e37ffa4f8f9cbae03c5cd1ca2406fb42f
-
SHA512
9250357f552769322ecb0c76f491c3804e24c7d3cdf05d63957a9ec6a303cdc1320eb4acc790cb3aae9088abbe713abc62e3bd64f0866ee689a0bdc7063671cd
Static task
static1
Behavioral task
behavioral1
Sample
0EE19BCC2B664AA10892F8E0A0AAEF9E37FFA4F8F9CBAE03C5CD1CA2406FB42F.apk
Resource
android-x86-arm-20220621-en
Malware Config
Targets
-
-
Target
0EE19BCC2B664AA10892F8E0A0AAEF9E37FFA4F8F9CBAE03C5CD1CA2406FB42F.apk
-
Size
29.3MB
-
MD5
37a3e8b3d977a930214ec10f6a793537
-
SHA1
b31dde48fcbc6b02c28c4cbebb3cdf8014d0d5ef
-
SHA256
0ee19bcc2b664aa10892f8e0a0aaef9e37ffa4f8f9cbae03c5cd1ca2406fb42f
-
SHA512
9250357f552769322ecb0c76f491c3804e24c7d3cdf05d63957a9ec6a303cdc1320eb4acc790cb3aae9088abbe713abc62e3bd64f0866ee689a0bdc7063671cd
Score10/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-