General
-
Target
41fd544d39bfd535aa2b0093cdd349fa34da6b55e93d25065b4b9a713eb86df3
-
Size
754KB
-
Sample
221126-yxqsjsee7w
-
MD5
59fdbaeb9b1536369ffb78e4aa7ca167
-
SHA1
98f1e0347c92b1085a5d26a447e76b9ce695840d
-
SHA256
41fd544d39bfd535aa2b0093cdd349fa34da6b55e93d25065b4b9a713eb86df3
-
SHA512
841346ac999b2acd9f31d33b5ad1352e01147f0994d81f2e7b99c0f3eea8a44a3b21bbc932e03ab8bf547f88c6b23318a16ec0ef17ad92c98ece6128a0556d27
-
SSDEEP
12288:ONn3NxAWJ89o5DokqW0yTwp6VwChXh4zJ8hbgSo4PyGN4GT:ON3jAw89yckqWjTpOJ8uC4o
Static task
static1
Behavioral task
behavioral1
Sample
41fd544d39bfd535aa2b0093cdd349fa34da6b55e93d25065b4b9a713eb86df3.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
41fd544d39bfd535aa2b0093cdd349fa34da6b55e93d25065b4b9a713eb86df3.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
41fd544d39bfd535aa2b0093cdd349fa34da6b55e93d25065b4b9a713eb86df3.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
41fd544d39bfd535aa2b0093cdd349fa34da6b55e93d25065b4b9a713eb86df3
-
Size
754KB
-
MD5
59fdbaeb9b1536369ffb78e4aa7ca167
-
SHA1
98f1e0347c92b1085a5d26a447e76b9ce695840d
-
SHA256
41fd544d39bfd535aa2b0093cdd349fa34da6b55e93d25065b4b9a713eb86df3
-
SHA512
841346ac999b2acd9f31d33b5ad1352e01147f0994d81f2e7b99c0f3eea8a44a3b21bbc932e03ab8bf547f88c6b23318a16ec0ef17ad92c98ece6128a0556d27
-
SSDEEP
12288:ONn3NxAWJ89o5DokqW0yTwp6VwChXh4zJ8hbgSo4PyGN4GT:ON3jAw89yckqWjTpOJ8uC4o
Score7/10-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-