General
-
Target
d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926
-
Size
1.6MB
-
Sample
221123-sq83naca43
-
MD5
6e1a642728ec61cca2c480c28421f9a6
-
SHA1
86a7e7bdb651b523b419eb9e2045f18f35a5c90f
-
SHA256
d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926
-
SHA512
a35f0b79eba748c0de938111094a6df2337752f1f9167223b0781f6ecdfaf8304f5d2fe0a3ff947972f70daef8c62bb93b734f9fd0bf704fcdf3ba3146d15757
-
SSDEEP
24576:O4yfMMDZWG4iGjTGbx0ECAEokpJ4K9mLbM6qq5MLlIa5N+qMYayebwQSsMWl61ga:C0M0/aqyjeJygU5uXYqydSLWlFkh
Static task
static1
Behavioral task
behavioral1
Sample
d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926
-
Size
1.6MB
-
MD5
6e1a642728ec61cca2c480c28421f9a6
-
SHA1
86a7e7bdb651b523b419eb9e2045f18f35a5c90f
-
SHA256
d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926
-
SHA512
a35f0b79eba748c0de938111094a6df2337752f1f9167223b0781f6ecdfaf8304f5d2fe0a3ff947972f70daef8c62bb93b734f9fd0bf704fcdf3ba3146d15757
-
SSDEEP
24576:O4yfMMDZWG4iGjTGbx0ECAEokpJ4K9mLbM6qq5MLlIa5N+qMYayebwQSsMWl61ga:C0M0/aqyjeJygU5uXYqydSLWlFkh
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-