General
-
Target
7704259605a615167de264b9e6664db098c098b2d4d69caeda53cc1c635e8468
-
Size
1.7MB
-
Sample
221126-xn2b9aba8s
-
MD5
640960039dc458b222603a8a0b8d01ee
-
SHA1
ca4a4f3e16e0886f84e30d1037dd8a666bd52fd5
-
SHA256
7704259605a615167de264b9e6664db098c098b2d4d69caeda53cc1c635e8468
-
SHA512
721ca0c35760a48dd2f72ab9c448e1392d69fbdcfb8b1024e4ec8091e156ff34a385ed79e911471a38ef38cbed7d15b088eeedd669414dec15bb71ce38d0e0d3
-
SSDEEP
24576:e0MDR0MdF1QYBWdE+iTr3194cLEjzPRVKUZC5ZvCdfVTX0p0uobZZz+FE01NoSJJ:W0MdVJgCmzPtCzadfVDJuobZZS7oS1
Static task
static1
Behavioral task
behavioral1
Sample
7704259605a615167de264b9e6664db098c098b2d4d69caeda53cc1c635e8468.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
7704259605a615167de264b9e6664db098c098b2d4d69caeda53cc1c635e8468
-
Size
1.7MB
-
MD5
640960039dc458b222603a8a0b8d01ee
-
SHA1
ca4a4f3e16e0886f84e30d1037dd8a666bd52fd5
-
SHA256
7704259605a615167de264b9e6664db098c098b2d4d69caeda53cc1c635e8468
-
SHA512
721ca0c35760a48dd2f72ab9c448e1392d69fbdcfb8b1024e4ec8091e156ff34a385ed79e911471a38ef38cbed7d15b088eeedd669414dec15bb71ce38d0e0d3
-
SSDEEP
24576:e0MDR0MdF1QYBWdE+iTr3194cLEjzPRVKUZC5ZvCdfVTX0p0uobZZz+FE01NoSJJ:W0MdVJgCmzPtCzadfVDJuobZZS7oS1
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-