General
-
Target
3490508a660f754a9f1a9ce9b06ba2734bc71f3a4eec7bd88e557c745c0c2edd
-
Size
546KB
-
Sample
221127-cl577sfg6z
-
MD5
d76a61a01b7c2df258ccd732f0143cf9
-
SHA1
fdcf7e22bc05e254178db55bebbdfbaf455d9fb1
-
SHA256
3490508a660f754a9f1a9ce9b06ba2734bc71f3a4eec7bd88e557c745c0c2edd
-
SHA512
f4422c4fc28cae4f38c9505d4e483ebf26cd8e456983ca366249b72f98c864e9e84e4b82d4bb9b4b82de39413532e3b6cedf9c10ed7744161c91f7dbbf9a9495
-
SSDEEP
12288:wnFx3w+jtKHIcJzmQWPtZUJIBiB5ERCjz6fNjr8rREK:wnbAUKHIcJKlPXUSiXEIzElr8VEK
Static task
static1
Behavioral task
behavioral1
Sample
3490508a660f754a9f1a9ce9b06ba2734bc71f3a4eec7bd88e557c745c0c2edd.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
3490508a660f754a9f1a9ce9b06ba2734bc71f3a4eec7bd88e557c745c0c2edd.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
3490508a660f754a9f1a9ce9b06ba2734bc71f3a4eec7bd88e557c745c0c2edd.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
3490508a660f754a9f1a9ce9b06ba2734bc71f3a4eec7bd88e557c745c0c2edd
-
Size
546KB
-
MD5
d76a61a01b7c2df258ccd732f0143cf9
-
SHA1
fdcf7e22bc05e254178db55bebbdfbaf455d9fb1
-
SHA256
3490508a660f754a9f1a9ce9b06ba2734bc71f3a4eec7bd88e557c745c0c2edd
-
SHA512
f4422c4fc28cae4f38c9505d4e483ebf26cd8e456983ca366249b72f98c864e9e84e4b82d4bb9b4b82de39413532e3b6cedf9c10ed7744161c91f7dbbf9a9495
-
SSDEEP
12288:wnFx3w+jtKHIcJzmQWPtZUJIBiB5ERCjz6fNjr8rREK:wnbAUKHIcJKlPXUSiXEIzElr8VEK
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-