General
-
Target
06bd97deb8ffad39178f63920d081c88e507f13782f3aaceac02be252d046fb9
-
Size
1.8MB
-
Sample
221126-s2eceseb22
-
MD5
48eae2e689e87ca4b32136d6022e9a9c
-
SHA1
f68e74a7833fb0bcaddd8c7f78b04d9624dae971
-
SHA256
06bd97deb8ffad39178f63920d081c88e507f13782f3aaceac02be252d046fb9
-
SHA512
244038e1ed02f93945d435fa40dc435c1f3ba1eb53ecaa15c507a2b7b6c2cf3b1951a5678e06c67a6676a39158f2ba2f2e4734de31643839d82dc87f461df6ea
-
SSDEEP
49152:G4UubVS1ajDu533LWcThB/d9T+x0pUVjKQiQCllw7CiHlOdDHB8molg3L:tUubVgWDc33KAhB1I2pUsQiQCllfhXoK
Static task
static1
Behavioral task
behavioral1
Sample
06bd97deb8ffad39178f63920d081c88e507f13782f3aaceac02be252d046fb9.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
06bd97deb8ffad39178f63920d081c88e507f13782f3aaceac02be252d046fb9.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
06bd97deb8ffad39178f63920d081c88e507f13782f3aaceac02be252d046fb9.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
06bd97deb8ffad39178f63920d081c88e507f13782f3aaceac02be252d046fb9
-
Size
1.8MB
-
MD5
48eae2e689e87ca4b32136d6022e9a9c
-
SHA1
f68e74a7833fb0bcaddd8c7f78b04d9624dae971
-
SHA256
06bd97deb8ffad39178f63920d081c88e507f13782f3aaceac02be252d046fb9
-
SHA512
244038e1ed02f93945d435fa40dc435c1f3ba1eb53ecaa15c507a2b7b6c2cf3b1951a5678e06c67a6676a39158f2ba2f2e4734de31643839d82dc87f461df6ea
-
SSDEEP
49152:G4UubVS1ajDu533LWcThB/d9T+x0pUVjKQiQCllw7CiHlOdDHB8molg3L:tUubVgWDc33KAhB1I2pUsQiQCllfhXoK
Score7/10-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests dangerous framework permissions
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-