General
-
Target
40e529b6a564e16d419f4b3d53039ffd89f791156d614fae52cbbe16470fa6ea
-
Size
15.3MB
-
Sample
221127-jjarvaad93
-
MD5
ca76d062e31fc0de0f75283b46f65834
-
SHA1
0084fbc22f2c2c795650bd82dbc842ba15263c5a
-
SHA256
40e529b6a564e16d419f4b3d53039ffd89f791156d614fae52cbbe16470fa6ea
-
SHA512
96d244dad4663ebfbde4b1ed7757040110580afb51460965714040f0078a03213dd50244ea29aed55a51d07219244e72adc95105427528d4ee81efc21b645c0d
-
SSDEEP
393216:a7EOFUCexOle2GQsfM3xLBRSpgLgW7HdSvdt0GGDQVD:a3FUtxEGPfCLB8pgEWUdt0Rq
Static task
static1
Behavioral task
behavioral1
Sample
40e529b6a564e16d419f4b3d53039ffd89f791156d614fae52cbbe16470fa6ea.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
40e529b6a564e16d419f4b3d53039ffd89f791156d614fae52cbbe16470fa6ea
-
Size
15.3MB
-
MD5
ca76d062e31fc0de0f75283b46f65834
-
SHA1
0084fbc22f2c2c795650bd82dbc842ba15263c5a
-
SHA256
40e529b6a564e16d419f4b3d53039ffd89f791156d614fae52cbbe16470fa6ea
-
SHA512
96d244dad4663ebfbde4b1ed7757040110580afb51460965714040f0078a03213dd50244ea29aed55a51d07219244e72adc95105427528d4ee81efc21b645c0d
-
SSDEEP
393216:a7EOFUCexOle2GQsfM3xLBRSpgLgW7HdSvdt0GGDQVD:a3FUtxEGPfCLB8pgEWUdt0Rq
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-