General
-
Target
45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4
-
Size
544KB
-
Sample
221126-bjz3qsee9y
-
MD5
168d2951061ee5e0e8190847a887feb9
-
SHA1
24a9dc299475a12e0f8a30447bf87a622639ea99
-
SHA256
45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4
-
SHA512
1033f161317fd2a8044f0ed4cbd017fae173d5ecc87b5dc273979fb8d0387053afee9a5f7a08bf4abaf4d8016223675fb5e4a3b80076baf117085a1baffbd216
-
SSDEEP
12288:5QFx+y4uiyoLBHnty1KybK/2ARTJMI67jBTMO+iG2VYO8u/3SsH:5QbB4uUZvgAhmrBo9P2VKu/3SsH
Static task
static1
Behavioral task
behavioral1
Sample
45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4
-
Size
544KB
-
MD5
168d2951061ee5e0e8190847a887feb9
-
SHA1
24a9dc299475a12e0f8a30447bf87a622639ea99
-
SHA256
45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4
-
SHA512
1033f161317fd2a8044f0ed4cbd017fae173d5ecc87b5dc273979fb8d0387053afee9a5f7a08bf4abaf4d8016223675fb5e4a3b80076baf117085a1baffbd216
-
SSDEEP
12288:5QFx+y4uiyoLBHnty1KybK/2ARTJMI67jBTMO+iG2VYO8u/3SsH:5QbB4uUZvgAhmrBo9P2VKu/3SsH
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-