General
-
Target
8021206190.zip
-
Size
1.6MB
-
Sample
220926-r2egraccdn
-
MD5
d07abe60afc19b897f402a78af23b241
-
SHA1
328c5958016138e06310ccb09d7dc6dad268ea8f
-
SHA256
30f074ff2f4859642ae3b7d1d4e8746f61d92a421e50aad2c486a3e892795f84
-
SHA512
f598624ac4505d3d1023eb5691f2ba66f3b57af70cf7c0d195cd5401a36b795b0040ae0d51925b0b1cdc4dbdab7170e9dd581920304d0287f61dbba9b47e3446
-
SSDEEP
49152:b3UUElKK6dF6acZRXHdCqlNz5i4AK+5Y3us268bE:bsleF2RXHdCqlNzM5Y3uc
Static task
static1
Behavioral task
behavioral1
Sample
ace5ec9030b603bd32f3f7b3b68957bac56b5c9dbaadd7e904303c0a4c1c29a4.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
ace5ec9030b603bd32f3f7b3b68957bac56b5c9dbaadd7e904303c0a4c1c29a4.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
ace5ec9030b603bd32f3f7b3b68957bac56b5c9dbaadd7e904303c0a4c1c29a4.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
ace5ec9030b603bd32f3f7b3b68957bac56b5c9dbaadd7e904303c0a4c1c29a4
-
Size
1.7MB
-
MD5
dfa7fef6df7e1e8cfa9a7bab1962ac5b
-
SHA1
2896f65e4953d29b8e6d3d805b465e315decf31f
-
SHA256
ace5ec9030b603bd32f3f7b3b68957bac56b5c9dbaadd7e904303c0a4c1c29a4
-
SHA512
5812002d03b15d41bb1f8089d653057387af4709f12e963763869dcb4c9366894be348fd33fbff42c5decd51d6e29a4ff088db30e1d50ca62d2ba2708e41bf6c
-
SSDEEP
24576:n6++0/+g0y0c1SQTFgzQaprpKcr9LCL5Z80ah3lUGwbJCJxFQmhgE4XBXEkMLChR:n60GhUnRgFFpr9GUmVbJCxfKfXSkFh+8
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-