General
-
Target
prog.apk
-
Size
20.6MB
-
Sample
221029-1kbh7shafj
-
MD5
63eb9e1f11e12e8eafdd93d868664f02
-
SHA1
dfc3ab43ffc558370b31f3bd8d18beda2f384392
-
SHA256
a311e0267409c0a8035d8b030eb97ce6ec7d750f231ed394db595aeee528c2fb
-
SHA512
af4f1264033bc1ff32a735cbcaf7eb2cfb5e8d6c19749aee9436f469586663930a83280f293ffb3e823b9635a679ef03df3fcb686dfa2ab9b856770600cd4e82
-
SSDEEP
393216:FdaOWsJA35z7A79L+IsT1mbgafiubchZnbtT9i/zVN2I+TXMBqKpPbNiRSKcsKJS:/aEJA35z7c5K5mbBffc3nvi/zVN2Ikcc
Static task
static1
Behavioral task
behavioral1
Sample
prog.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
prog.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
prog.apk
-
Size
20.6MB
-
MD5
63eb9e1f11e12e8eafdd93d868664f02
-
SHA1
dfc3ab43ffc558370b31f3bd8d18beda2f384392
-
SHA256
a311e0267409c0a8035d8b030eb97ce6ec7d750f231ed394db595aeee528c2fb
-
SHA512
af4f1264033bc1ff32a735cbcaf7eb2cfb5e8d6c19749aee9436f469586663930a83280f293ffb3e823b9635a679ef03df3fcb686dfa2ab9b856770600cd4e82
-
SSDEEP
393216:FdaOWsJA35z7A79L+IsT1mbgafiubchZnbtT9i/zVN2I+TXMBqKpPbNiRSKcsKJS:/aEJA35z7c5K5mbBffc3nvi/zVN2Ikcc
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-