General
-
Target
4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6
-
Size
1.5MB
-
Sample
221123-sv4nqscc87
-
MD5
e3bc906963bccbef2ebabc0bce502849
-
SHA1
39ef3902e8fe286377b658b6b93b3d4122b95a30
-
SHA256
4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6
-
SHA512
ad42f6219ed8ea760494adffa79b802c12e02436e12576adb3497ac2c26bf721ef8ea85f70a7ee1b40e9bf73334cc33a0d466712433cc5d189e4f900db567f9c
-
SSDEEP
49152:9OuOYmbclX4jwfzK3XRuV8et30MImJr7SX2KTwQ:IuPqwfWQVft30MIWr7c9
Static task
static1
Behavioral task
behavioral1
Sample
4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6
-
Size
1.5MB
-
MD5
e3bc906963bccbef2ebabc0bce502849
-
SHA1
39ef3902e8fe286377b658b6b93b3d4122b95a30
-
SHA256
4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6
-
SHA512
ad42f6219ed8ea760494adffa79b802c12e02436e12576adb3497ac2c26bf721ef8ea85f70a7ee1b40e9bf73334cc33a0d466712433cc5d189e4f900db567f9c
-
SSDEEP
49152:9OuOYmbclX4jwfzK3XRuV8et30MImJr7SX2KTwQ:IuPqwfWQVft30MIWr7c9
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads the content of SMS inbox messages.
-
Tries to add a device administrator.
-