General
-
Target
961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6
-
Size
1.9MB
-
Sample
221123-sqd8aafa51
-
MD5
58f160a021279cb9d149aa74a2c422e0
-
SHA1
bcc970c3af6aa0286ec17abc3654eb1dfd5f05a8
-
SHA256
961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6
-
SHA512
dbde4a676d7268ef7ad8b97389154a7a65e725745e31a2ddd3108bc217e2a818826de514dd608acd124e9fbd02e74302f6e3f083dbc01b74199336f38e0a0a9d
-
SSDEEP
49152:n/mlr3oSzljwnyxIP6PLBCKv8kgdmJPPFSBvX:/yr3oAsyiyPLD8zEJPPEvX
Static task
static1
Behavioral task
behavioral1
Sample
961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6
-
Size
1.9MB
-
MD5
58f160a021279cb9d149aa74a2c422e0
-
SHA1
bcc970c3af6aa0286ec17abc3654eb1dfd5f05a8
-
SHA256
961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6
-
SHA512
dbde4a676d7268ef7ad8b97389154a7a65e725745e31a2ddd3108bc217e2a818826de514dd608acd124e9fbd02e74302f6e3f083dbc01b74199336f38e0a0a9d
-
SSDEEP
49152:n/mlr3oSzljwnyxIP6PLBCKv8kgdmJPPFSBvX:/yr3oAsyiyPLD8zEJPPEvX
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-