General
-
Target
eb5a548c1d7565cf7ac3c3363edf9d2b13be83865c5f40aeef23097f34bb3cb5
-
Size
4.7MB
-
Sample
221127-1r9dtafd9y
-
MD5
d4a845ea47b3bf8893f964cc883eae41
-
SHA1
4a2527c77451ce9db795f0354543a6c7b3953362
-
SHA256
eb5a548c1d7565cf7ac3c3363edf9d2b13be83865c5f40aeef23097f34bb3cb5
-
SHA512
8a562c785bd3d658f4ee390fab2f5fd7199eed54b52a328ea47a471fb2927786d2172820713d9e0641dc55e85fbc255f1be9cbe8580330fb0155a1749765bf3b
-
SSDEEP
98304:oc7C1cRBEm/gc9v1m468bWduyYZIuL+DsvKbs8f5D4Bm6Y5gx:NC1cDogs4Zmxs8R8x
Static task
static1
Behavioral task
behavioral1
Sample
eb5a548c1d7565cf7ac3c3363edf9d2b13be83865c5f40aeef23097f34bb3cb5.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
eb5a548c1d7565cf7ac3c3363edf9d2b13be83865c5f40aeef23097f34bb3cb5
-
Size
4.7MB
-
MD5
d4a845ea47b3bf8893f964cc883eae41
-
SHA1
4a2527c77451ce9db795f0354543a6c7b3953362
-
SHA256
eb5a548c1d7565cf7ac3c3363edf9d2b13be83865c5f40aeef23097f34bb3cb5
-
SHA512
8a562c785bd3d658f4ee390fab2f5fd7199eed54b52a328ea47a471fb2927786d2172820713d9e0641dc55e85fbc255f1be9cbe8580330fb0155a1749765bf3b
-
SSDEEP
98304:oc7C1cRBEm/gc9v1m468bWduyYZIuL+DsvKbs8f5D4Bm6Y5gx:NC1cDogs4Zmxs8R8x
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-