General
-
Target
2683f1ac81dd7c1a45dc681a18b806e215c004ca37389d50805472568675ab74
-
Size
30.6MB
-
Sample
221126-xhqzbsfe58
-
MD5
d501138bf649daced720966ba22daf4f
-
SHA1
c007bdcb11aac5bed8fcfa9b75cd7e96c5092689
-
SHA256
2683f1ac81dd7c1a45dc681a18b806e215c004ca37389d50805472568675ab74
-
SHA512
0016cd5d1ccf95f2ff9c37928d0d05f5bc4e3c6a3a756a9b43af5e085c643a9ff1c6c32050d2d5fefcc4acf458317b81120e0a126a0e33af26d788ea14a777b6
-
SSDEEP
786432:VKhpVcKu7I0JAj3LXElRTWlFNyLsqi4mEY1vxVvOo23:whjcKu7IZ34lh2NmePxVvO53
Static task
static1
Behavioral task
behavioral1
Sample
2683f1ac81dd7c1a45dc681a18b806e215c004ca37389d50805472568675ab74.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
2683f1ac81dd7c1a45dc681a18b806e215c004ca37389d50805472568675ab74
-
Size
30.6MB
-
MD5
d501138bf649daced720966ba22daf4f
-
SHA1
c007bdcb11aac5bed8fcfa9b75cd7e96c5092689
-
SHA256
2683f1ac81dd7c1a45dc681a18b806e215c004ca37389d50805472568675ab74
-
SHA512
0016cd5d1ccf95f2ff9c37928d0d05f5bc4e3c6a3a756a9b43af5e085c643a9ff1c6c32050d2d5fefcc4acf458317b81120e0a126a0e33af26d788ea14a777b6
-
SSDEEP
786432:VKhpVcKu7I0JAj3LXElRTWlFNyLsqi4mEY1vxVvOo23:whjcKu7IZ34lh2NmePxVvO53
Score7/10-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-