General
-
Target
ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4
-
Size
3.0MB
-
Sample
221127-lp4yzsbh4w
-
MD5
09647fcc43c94134505a3ca9439c4ecb
-
SHA1
6ab8885b3299daedad79cbc168f2c2bd680c2c54
-
SHA256
ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4
-
SHA512
86b5272a39815d6ad27b6a67d6daef7e12135b078ab33b72235127fe3e15a6f83654d61739c7b391c36876681d3923c7515f14045f6c4052327762f14ba399e9
-
SSDEEP
49152:X6OCZoRw4bWnFOWqmTfic6NDpBk2qN5/zqX5RkeRWpMFFvQWl9nvX:Xyuw4bWFgc6N1BHu5/+bkeRWKvvd/vX
Static task
static1
Behavioral task
behavioral1
Sample
ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4
-
Size
3.0MB
-
MD5
09647fcc43c94134505a3ca9439c4ecb
-
SHA1
6ab8885b3299daedad79cbc168f2c2bd680c2c54
-
SHA256
ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4
-
SHA512
86b5272a39815d6ad27b6a67d6daef7e12135b078ab33b72235127fe3e15a6f83654d61739c7b391c36876681d3923c7515f14045f6c4052327762f14ba399e9
-
SSDEEP
49152:X6OCZoRw4bWnFOWqmTfic6NDpBk2qN5/zqX5RkeRWpMFFvQWl9nvX:Xyuw4bWFgc6N1BHu5/+bkeRWKvvd/vX
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-