General
-
Target
3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417
-
Size
30.1MB
-
Sample
221126-g414esgh75
-
MD5
7be9ba64e1dc67fccf6ef31bf7bfe8c8
-
SHA1
fd16b26a36db85a5049d96dd8b8ee1bca93977ed
-
SHA256
3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417
-
SHA512
4f7a7a8eac93e2ad5e4b4dd37609ac98761fcf00ae2e416d174e0a71b8ae14c71ef568b319dc9d0024faf2d4da1159f50513dd834f67c95f70d1f54d0bd8b2b4
-
SSDEEP
786432:s1eQ1vUxSpes0EvM4kKyT/WqEG4scs03ykjW/TFFDb1+Uc:s1HF06M4kj/tEzikaTF9boL
Static task
static1
Behavioral task
behavioral1
Sample
3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417
-
Size
30.1MB
-
MD5
7be9ba64e1dc67fccf6ef31bf7bfe8c8
-
SHA1
fd16b26a36db85a5049d96dd8b8ee1bca93977ed
-
SHA256
3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417
-
SHA512
4f7a7a8eac93e2ad5e4b4dd37609ac98761fcf00ae2e416d174e0a71b8ae14c71ef568b319dc9d0024faf2d4da1159f50513dd834f67c95f70d1f54d0bd8b2b4
-
SSDEEP
786432:s1eQ1vUxSpes0EvM4kKyT/WqEG4scs03ykjW/TFFDb1+Uc:s1HF06M4kj/tEzikaTF9boL
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-