General
-
Target
b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb.apk
-
Size
20.6MB
-
Sample
220910-g4bhrsdddl
-
MD5
435cf6ca76dacc135c816eed98db31dd
-
SHA1
ec8ec75b5e50ecbfc82ed3e486ff22aa0d64b900
-
SHA256
b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb
-
SHA512
32bfe6e7aadbd0d30751656db0f241d4ff9388f8144ed45f06bba5928325b5acb1270af7fc71aa6fef6f274628d5f81201de5e40346295c696536f407294a2a8
-
SSDEEP
393216:+NvssJA35z7A79L+9SJ1mbgafiubcSZ7bnT9i/zVN2I+TXC52KpPbNiRSKcsxJ0:sLJA35z7c5x/mbBffcI7Vi/zVN2Iky8m
Static task
static1
Behavioral task
behavioral1
Sample
b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb.apk
-
Size
20.6MB
-
MD5
435cf6ca76dacc135c816eed98db31dd
-
SHA1
ec8ec75b5e50ecbfc82ed3e486ff22aa0d64b900
-
SHA256
b23d2ed654ad9f91112cc0495837f82f00437eefdb3246fa65ae0945d811cfbb
-
SHA512
32bfe6e7aadbd0d30751656db0f241d4ff9388f8144ed45f06bba5928325b5acb1270af7fc71aa6fef6f274628d5f81201de5e40346295c696536f407294a2a8
-
SSDEEP
393216:+NvssJA35z7A79L+9SJ1mbgafiubcSZ7bnT9i/zVN2I+TXC52KpPbNiRSKcsxJ0:sLJA35z7c5x/mbBffcI7Vi/zVN2Iky8m
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-