General
-
Target
a9431713cf94529103a88020a986bdf3a22016b49aa95fb0565969b3b501506d
-
Size
16.3MB
-
Sample
221126-gf2p2sad4w
-
MD5
1aeff4ab48e97bf4a363a89ad3eee976
-
SHA1
13aded113a5cd17b920066f30fbe5fc6952b32aa
-
SHA256
a9431713cf94529103a88020a986bdf3a22016b49aa95fb0565969b3b501506d
-
SHA512
225d1fc187c6f40419d07b04f50830f8dff641990aeaa3ac33a58b2921aa3b1d91126ccdff6df7884f54de979e94a58a64d8105e31a6702927f32a62aa677b97
-
SSDEEP
393216:e3Ndfw/hMdDuDfpWsUxNL3sKnau1Dfqc4l25Xq/vwO065heZFiTH8:QdSMUdeN3namROvw+IHQH8
Static task
static1
Behavioral task
behavioral1
Sample
a9431713cf94529103a88020a986bdf3a22016b49aa95fb0565969b3b501506d.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
a9431713cf94529103a88020a986bdf3a22016b49aa95fb0565969b3b501506d
-
Size
16.3MB
-
MD5
1aeff4ab48e97bf4a363a89ad3eee976
-
SHA1
13aded113a5cd17b920066f30fbe5fc6952b32aa
-
SHA256
a9431713cf94529103a88020a986bdf3a22016b49aa95fb0565969b3b501506d
-
SHA512
225d1fc187c6f40419d07b04f50830f8dff641990aeaa3ac33a58b2921aa3b1d91126ccdff6df7884f54de979e94a58a64d8105e31a6702927f32a62aa677b97
-
SSDEEP
393216:e3Ndfw/hMdDuDfpWsUxNL3sKnau1Dfqc4l25Xq/vwO065heZFiTH8:QdSMUdeN3namROvw+IHQH8
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-