General
-
Target
efdf46939d1e8c5cb355c111d2141552c72e1aa486e4abf5ba6082f9d42bc773.apk
-
Size
20.6MB
-
Sample
220925-hpszyaehfj
-
MD5
ef3c97b748088019dc986dce53ae0755
-
SHA1
da6e0f1022e0c9a7f1966ecbc21517cddab9bc1d
-
SHA256
efdf46939d1e8c5cb355c111d2141552c72e1aa486e4abf5ba6082f9d42bc773
-
SHA512
80ffbb2358ccea72c82822a1362d606d0def6dca0687e707ce071eacf0e910cb87d39ef79ea036cd39b5f2376d4b5ff485b3792020aab5d2f2a29b14253893fe
-
SSDEEP
393216:CR5ab0+sJA35z7A79L+VGJ1mbgafiubc6ZfbbT9i/zVN2I+TXyJGKpPbNiRSKcsi:ghJA35z7c55/mbBffcQfxi/zVN2Iki08
Static task
static1
Behavioral task
behavioral1
Sample
efdf46939d1e8c5cb355c111d2141552c72e1aa486e4abf5ba6082f9d42bc773.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
efdf46939d1e8c5cb355c111d2141552c72e1aa486e4abf5ba6082f9d42bc773.apk
Resource
android-x64-20220823-en
Malware Config
Targets
-
-
Target
efdf46939d1e8c5cb355c111d2141552c72e1aa486e4abf5ba6082f9d42bc773.apk
-
Size
20.6MB
-
MD5
ef3c97b748088019dc986dce53ae0755
-
SHA1
da6e0f1022e0c9a7f1966ecbc21517cddab9bc1d
-
SHA256
efdf46939d1e8c5cb355c111d2141552c72e1aa486e4abf5ba6082f9d42bc773
-
SHA512
80ffbb2358ccea72c82822a1362d606d0def6dca0687e707ce071eacf0e910cb87d39ef79ea036cd39b5f2376d4b5ff485b3792020aab5d2f2a29b14253893fe
-
SSDEEP
393216:CR5ab0+sJA35z7A79L+VGJ1mbgafiubc6ZfbbT9i/zVN2I+TXyJGKpPbNiRSKcsi:ghJA35z7c55/mbBffcQfxi/zVN2Iki08
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-