General
-
Target
10e1296058f36bc3542e03858e921251d266a11bf245acb2ea4af89858bc11a4.apk
-
Size
20.6MB
-
Sample
220916-jkvhmsagbp
-
MD5
e696972add3d05256d98df9c9354a624
-
SHA1
0b25bebc06de09611e0411f4b96342e4fca1a540
-
SHA256
10e1296058f36bc3542e03858e921251d266a11bf245acb2ea4af89858bc11a4
-
SHA512
662521855ca508788a310880b270899392416d9d50cc815eb6feb96258f8b19290ff9bee5ec3e9a910fef382732a1b3e66130936075c81951d1851bf948a238b
-
SSDEEP
393216:BYnsJA35z7A79L+mE/1mbgafiubcjZLbxT9i/zVN2I+TXd5UKpPbNiRSKcsZJN:B1JA35z7c5I9mbBffcNLbi/zVN2Ikta/
Static task
static1
Behavioral task
behavioral1
Sample
10e1296058f36bc3542e03858e921251d266a11bf245acb2ea4af89858bc11a4.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
10e1296058f36bc3542e03858e921251d266a11bf245acb2ea4af89858bc11a4.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
10e1296058f36bc3542e03858e921251d266a11bf245acb2ea4af89858bc11a4.apk
-
Size
20.6MB
-
MD5
e696972add3d05256d98df9c9354a624
-
SHA1
0b25bebc06de09611e0411f4b96342e4fca1a540
-
SHA256
10e1296058f36bc3542e03858e921251d266a11bf245acb2ea4af89858bc11a4
-
SHA512
662521855ca508788a310880b270899392416d9d50cc815eb6feb96258f8b19290ff9bee5ec3e9a910fef382732a1b3e66130936075c81951d1851bf948a238b
-
SSDEEP
393216:BYnsJA35z7A79L+mE/1mbgafiubcjZLbxT9i/zVN2I+TXd5UKpPbNiRSKcsZJN:B1JA35z7c5I9mbBffcNLbi/zVN2Ikta/
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-