General
-
Target
daf0257c0fd3883d68dd90b554a6171be20a1263d1f702a29972805ad97813f2
-
Size
614KB
-
Sample
221126-z5zwvshh9w
-
MD5
e9f774000bf38801f9690769ec90f0bd
-
SHA1
c3763549e90d41ae8f0296502dc543ae9cd8534d
-
SHA256
daf0257c0fd3883d68dd90b554a6171be20a1263d1f702a29972805ad97813f2
-
SHA512
dbaed5843b5924cecef21b559cb4a6c580510bdbb7562ecf0fef7a648b4040c9a771b71e4eaa91eb71a7f47d2856da93e31a154705b83feb1a629ca5853b3182
-
SSDEEP
12288:YSFx8AHZt9LAmSFYUNFXek11FBi/aHluOvArpwyou:YSb5Zt9ZLUNFXeW1FBiCg0u
Static task
static1
Behavioral task
behavioral1
Sample
daf0257c0fd3883d68dd90b554a6171be20a1263d1f702a29972805ad97813f2.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
daf0257c0fd3883d68dd90b554a6171be20a1263d1f702a29972805ad97813f2.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
daf0257c0fd3883d68dd90b554a6171be20a1263d1f702a29972805ad97813f2.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
daf0257c0fd3883d68dd90b554a6171be20a1263d1f702a29972805ad97813f2
-
Size
614KB
-
MD5
e9f774000bf38801f9690769ec90f0bd
-
SHA1
c3763549e90d41ae8f0296502dc543ae9cd8534d
-
SHA256
daf0257c0fd3883d68dd90b554a6171be20a1263d1f702a29972805ad97813f2
-
SHA512
dbaed5843b5924cecef21b559cb4a6c580510bdbb7562ecf0fef7a648b4040c9a771b71e4eaa91eb71a7f47d2856da93e31a154705b83feb1a629ca5853b3182
-
SSDEEP
12288:YSFx8AHZt9LAmSFYUNFXek11FBi/aHluOvArpwyou:YSb5Zt9ZLUNFXeW1FBiCg0u
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-