General
-
Target
c4ed72bd08e0651a9f75d075ba59d0465c0e8a62315b99fa3d797df7d94b5f34
-
Size
1.2MB
-
Sample
221127-n3rlxsef78
-
MD5
65be50c4deae1d09a000330961bc11e6
-
SHA1
a3c93db191f46c9621c89edaa31823956c6b2404
-
SHA256
c4ed72bd08e0651a9f75d075ba59d0465c0e8a62315b99fa3d797df7d94b5f34
-
SHA512
cbe77dcd02626538a4d2fa030f6f474c05e48af94620645a1514527a05aaaeb0751b0a3dd2148aeb9c1c6b164e3894159bbae2792bb5c802383cdea4f8883e2b
-
SSDEEP
24576:gBACmwB2WpeTXszSEHOoHIaKzxhpxzZ52HhsRwscrZN/vqV8KMBJVRYsyF:geCFB2lrsz5HOokx7mh4WnniqVYsyF
Static task
static1
Behavioral task
behavioral1
Sample
c4ed72bd08e0651a9f75d075ba59d0465c0e8a62315b99fa3d797df7d94b5f34.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
c4ed72bd08e0651a9f75d075ba59d0465c0e8a62315b99fa3d797df7d94b5f34
-
Size
1.2MB
-
MD5
65be50c4deae1d09a000330961bc11e6
-
SHA1
a3c93db191f46c9621c89edaa31823956c6b2404
-
SHA256
c4ed72bd08e0651a9f75d075ba59d0465c0e8a62315b99fa3d797df7d94b5f34
-
SHA512
cbe77dcd02626538a4d2fa030f6f474c05e48af94620645a1514527a05aaaeb0751b0a3dd2148aeb9c1c6b164e3894159bbae2792bb5c802383cdea4f8883e2b
-
SSDEEP
24576:gBACmwB2WpeTXszSEHOoHIaKzxhpxzZ52HhsRwscrZN/vqV8KMBJVRYsyF:geCFB2lrsz5HOokx7mh4WnniqVYsyF
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-