General
-
Target
56a74ec9f5252ca74fcbfd1229f56726916e3625e0bcc9fb10bd209ecae46867
-
Size
2.9MB
-
Sample
221126-bjw13see81
-
MD5
a01ab470f8981e19328babc0c254a0bd
-
SHA1
b4357b161eea4a26e417b69c2f5e40279ca4ee17
-
SHA256
56a74ec9f5252ca74fcbfd1229f56726916e3625e0bcc9fb10bd209ecae46867
-
SHA512
58903c6be1edb4e6d600a3a9d47f3ab7f9b86e73e328c507b32ac60be538fa90b209ba77be9f7fd2b224ff958d2c451430dcd088f470d87408216f0a15fb2a76
-
SSDEEP
49152:+Sw4ohPpI/iwHku27d7/UV+lKtzvOAkYWTVY5WH1XITHL7i3rYGsB:+SwNa5HnuBMIKNtahVV23i3rYDB
Static task
static1
Behavioral task
behavioral1
Sample
56a74ec9f5252ca74fcbfd1229f56726916e3625e0bcc9fb10bd209ecae46867.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
56a74ec9f5252ca74fcbfd1229f56726916e3625e0bcc9fb10bd209ecae46867
-
Size
2.9MB
-
MD5
a01ab470f8981e19328babc0c254a0bd
-
SHA1
b4357b161eea4a26e417b69c2f5e40279ca4ee17
-
SHA256
56a74ec9f5252ca74fcbfd1229f56726916e3625e0bcc9fb10bd209ecae46867
-
SHA512
58903c6be1edb4e6d600a3a9d47f3ab7f9b86e73e328c507b32ac60be538fa90b209ba77be9f7fd2b224ff958d2c451430dcd088f470d87408216f0a15fb2a76
-
SSDEEP
49152:+Sw4ohPpI/iwHku27d7/UV+lKtzvOAkYWTVY5WH1XITHL7i3rYGsB:+SwNa5HnuBMIKNtahVV23i3rYDB
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-