General
-
Target
e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df
-
Size
438KB
-
Sample
221123-xjxhhafb95
-
MD5
4f90c9fb3ee8cb50bfa20a419b2ed5af
-
SHA1
671fc353c614eaac33569765626d466620cc350f
-
SHA256
e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df
-
SHA512
032ffd65ae36a554dae56cd375161358218c885c28eebbc702bdc0397f86d0a927730afcd0c880351c18df105fe98c9c86c1f7ff2cd43d281529f328ad4962fb
-
SSDEEP
6144:pxko+hPu2HlS2jY1E6prsVYkGaxKFTpCyAfGx0SPObTCXaP8tGhuip:p6hPu2FS0Y1oFxKrQJEKTCXaPLhuip
Static task
static1
Behavioral task
behavioral1
Sample
e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df
-
Size
438KB
-
MD5
4f90c9fb3ee8cb50bfa20a419b2ed5af
-
SHA1
671fc353c614eaac33569765626d466620cc350f
-
SHA256
e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df
-
SHA512
032ffd65ae36a554dae56cd375161358218c885c28eebbc702bdc0397f86d0a927730afcd0c880351c18df105fe98c9c86c1f7ff2cd43d281529f328ad4962fb
-
SSDEEP
6144:pxko+hPu2HlS2jY1E6prsVYkGaxKFTpCyAfGx0SPObTCXaP8tGhuip:p6hPu2FS0Y1oFxKrQJEKTCXaPLhuip
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-