General
-
Target
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660
-
Size
1.7MB
-
Sample
221124-ddyntsfh5x
-
MD5
af8381775684f95103a7f26c68c63785
-
SHA1
db5d64721e8994c0b5d361d389faa2f4abb9c673
-
SHA256
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660
-
SHA512
96b98536ae687f90927966ea0245185f5fbe74e278ac9adba0b34accb5e476ab5b7d885005e747bfa424e50aa0a039bd241566e0dc073d5a08dfd35783ca7dd7
-
SSDEEP
49152:TKHePmxkUmzF3qFxvUZ4VG/SWqM0HpqytLbfz7Hza:T8xRmzFaveODTUyhzHG
Static task
static1
Behavioral task
behavioral1
Sample
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660
-
Size
1.7MB
-
MD5
af8381775684f95103a7f26c68c63785
-
SHA1
db5d64721e8994c0b5d361d389faa2f4abb9c673
-
SHA256
bade37d72738f13b8a4878812a13c2501e2826a6fb17a5bb78dc130a27cff660
-
SHA512
96b98536ae687f90927966ea0245185f5fbe74e278ac9adba0b34accb5e476ab5b7d885005e747bfa424e50aa0a039bd241566e0dc073d5a08dfd35783ca7dd7
-
SSDEEP
49152:TKHePmxkUmzF3qFxvUZ4VG/SWqM0HpqytLbfz7Hza:T8xRmzFaveODTUyhzHG
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads the content of SMS inbox messages.
-
Tries to add a device administrator.
-
Uses Crypto APIs (Might try to encrypt user data).
-