General
-
Target
b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b
-
Size
1.6MB
-
Sample
221123-sq9n7aca44
-
MD5
a52ff18b7677432d274f28bdb766cf57
-
SHA1
281d6161ae3631c25b24f23b5a52d107540a8c43
-
SHA256
b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b
-
SHA512
b41dddaa201ed614bb9efb9ef67ae0dd5b70d19bb6f9d596ae46710f73714c2e78f7f870aa8dc74bed64937b7383fe1644fb5a73776c9cec93cf42bfd3b7febd
-
SSDEEP
24576:T4yfMMDZWG4iGjTGbx0ECAEokpJ4K9mLbM6qq5MLlIa5N+qMYayebwQSsMWl61gE:v0M0/aqyjeJygU5uXYqydSLWlFkn
Static task
static1
Behavioral task
behavioral1
Sample
b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b
-
Size
1.6MB
-
MD5
a52ff18b7677432d274f28bdb766cf57
-
SHA1
281d6161ae3631c25b24f23b5a52d107540a8c43
-
SHA256
b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b
-
SHA512
b41dddaa201ed614bb9efb9ef67ae0dd5b70d19bb6f9d596ae46710f73714c2e78f7f870aa8dc74bed64937b7383fe1644fb5a73776c9cec93cf42bfd3b7febd
-
SSDEEP
24576:T4yfMMDZWG4iGjTGbx0ECAEokpJ4K9mLbM6qq5MLlIa5N+qMYayebwQSsMWl61gE:v0M0/aqyjeJygU5uXYqydSLWlFkn
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-