General
-
Target
94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502
-
Size
955KB
-
Sample
221127-hkr7vafh46
-
MD5
9385a478eda117bb19027fa7460e74db
-
SHA1
3d6b93260d35014282bd51af68ddf83d9155d7a1
-
SHA256
94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502
-
SHA512
b1bd7a4bd3c971f4c6b33d0ca2868151fa0ca757cb55d88c65d3e6237c8b48578351b43e7458b9749ab281616a89a1233f29e10d41a3fbb347ce54f3f3f016a5
-
SSDEEP
24576:N4mAw8SEwvrgKVKG/5IGQYQBuRSqdnuZ8uC4Z:Naw8bOrhIGAZ8ut
Static task
static1
Behavioral task
behavioral1
Sample
94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502
-
Size
955KB
-
MD5
9385a478eda117bb19027fa7460e74db
-
SHA1
3d6b93260d35014282bd51af68ddf83d9155d7a1
-
SHA256
94cb5adf4b9b4708ae546d406fee358b2f0b7717c903f87e0013cdea090d9502
-
SHA512
b1bd7a4bd3c971f4c6b33d0ca2868151fa0ca757cb55d88c65d3e6237c8b48578351b43e7458b9749ab281616a89a1233f29e10d41a3fbb347ce54f3f3f016a5
-
SSDEEP
24576:N4mAw8SEwvrgKVKG/5IGQYQBuRSqdnuZ8uC4Z:Naw8bOrhIGAZ8ut
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-