General
-
Target
07970208cd04e17197747089501eb36bcfe4496161e3688df2401c7c47e3e1fd
-
Size
659KB
-
Sample
221122-yj7txaae8w
-
MD5
6273b791053a92bc6fccbf3d2c640803
-
SHA1
a2b3f2d5099273bf6108fd72bf163293cd77993a
-
SHA256
07970208cd04e17197747089501eb36bcfe4496161e3688df2401c7c47e3e1fd
-
SHA512
dc9b18905a80cd7725263895f6f70ac1a13cb28d35eca45b52dbad1b77013dc3004be7b0ac84572aae4fdbcd8008075ab5cd8b9538de1d98c6902ade2ff3dd0d
-
SSDEEP
12288:9edlE5mnKWwwyRVxcFaVlR/V3EJ/6tBrWXB8qBmDlybjfCgdLnawSrXI6Di:9+Imn+v/aC/9qBmpUjfpeDBDi
Static task
static1
Behavioral task
behavioral1
Sample
07970208cd04e17197747089501eb36bcfe4496161e3688df2401c7c47e3e1fd.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
07970208cd04e17197747089501eb36bcfe4496161e3688df2401c7c47e3e1fd.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
07970208cd04e17197747089501eb36bcfe4496161e3688df2401c7c47e3e1fd.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
07970208cd04e17197747089501eb36bcfe4496161e3688df2401c7c47e3e1fd
-
Size
659KB
-
MD5
6273b791053a92bc6fccbf3d2c640803
-
SHA1
a2b3f2d5099273bf6108fd72bf163293cd77993a
-
SHA256
07970208cd04e17197747089501eb36bcfe4496161e3688df2401c7c47e3e1fd
-
SHA512
dc9b18905a80cd7725263895f6f70ac1a13cb28d35eca45b52dbad1b77013dc3004be7b0ac84572aae4fdbcd8008075ab5cd8b9538de1d98c6902ade2ff3dd0d
-
SSDEEP
12288:9edlE5mnKWwwyRVxcFaVlR/V3EJ/6tBrWXB8qBmDlybjfCgdLnawSrXI6Di:9+Imn+v/aC/9qBmpUjfpeDBDi
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Reads the content of SMS inbox messages.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-