General
-
Target
54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7
-
Size
4.6MB
-
Sample
221125-l1y7wach2y
-
MD5
b45fa7f5250c25d999da645a498ac026
-
SHA1
85efc4e36a8c20e3216be0277e44407015578478
-
SHA256
54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7
-
SHA512
d96533a5c4053cbbf6b1b85da4fb0ad6ff851c672db8e3bb5a576201f7f51e58aa8bcbc51cb3b439634fb2d753b5986aac2f1759c990524c1c49dc3cc3d1fa84
-
SSDEEP
98304:xB/7jU4RFtmNMFK9UFZJOFtwC3xFfBLPvsUncTCPh+RHmEPH5mf:xBc4QNIwUFZJaDhF5js4cmyfhk
Static task
static1
Behavioral task
behavioral1
Sample
54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7
-
Size
4.6MB
-
MD5
b45fa7f5250c25d999da645a498ac026
-
SHA1
85efc4e36a8c20e3216be0277e44407015578478
-
SHA256
54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7
-
SHA512
d96533a5c4053cbbf6b1b85da4fb0ad6ff851c672db8e3bb5a576201f7f51e58aa8bcbc51cb3b439634fb2d753b5986aac2f1759c990524c1c49dc3cc3d1fa84
-
SSDEEP
98304:xB/7jU4RFtmNMFK9UFZJOFtwC3xFfBLPvsUncTCPh+RHmEPH5mf:xBc4QNIwUFZJaDhF5js4cmyfhk
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-