General
-
Target
11386bf71529443b75dcc6aea61d9405d85bc73a626e0cd6ab83eb1ec7e75ea4
-
Size
29.5MB
-
Sample
221126-b4pgqsfh4s
-
MD5
54ff8673dead8c332794fc8f32a70307
-
SHA1
6f28d54e05125624978e2b200b1dac9996d71626
-
SHA256
11386bf71529443b75dcc6aea61d9405d85bc73a626e0cd6ab83eb1ec7e75ea4
-
SHA512
8f2649b895b8b1fcdff07776a81eaf36961488ffc398eadbed16e2338512f28d4a1572d71a747f754fab5172d713ce9599cdae6ba255b3a7eb6490b37b826938
-
SSDEEP
786432:ryDjh0MljpuiV4YyMu4+CsWqHoFHZez8/B:4hLjpuiVPTuDWlN0z0
Static task
static1
Behavioral task
behavioral1
Sample
11386bf71529443b75dcc6aea61d9405d85bc73a626e0cd6ab83eb1ec7e75ea4.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
11386bf71529443b75dcc6aea61d9405d85bc73a626e0cd6ab83eb1ec7e75ea4
-
Size
29.5MB
-
MD5
54ff8673dead8c332794fc8f32a70307
-
SHA1
6f28d54e05125624978e2b200b1dac9996d71626
-
SHA256
11386bf71529443b75dcc6aea61d9405d85bc73a626e0cd6ab83eb1ec7e75ea4
-
SHA512
8f2649b895b8b1fcdff07776a81eaf36961488ffc398eadbed16e2338512f28d4a1572d71a747f754fab5172d713ce9599cdae6ba255b3a7eb6490b37b826938
-
SSDEEP
786432:ryDjh0MljpuiV4YyMu4+CsWqHoFHZez8/B:4hLjpuiVPTuDWlN0z0
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-