General
-
Target
b7f44e1ffd260f950508d3626d6074c040e02bb1e42a6f0ee4f1bd1f03634593
-
Size
893KB
-
Sample
221127-nn3qmsha9x
-
MD5
7c0d4d41874e7108c34f8a3f8d8b0382
-
SHA1
cf10c9e19ca049e233ce939e52cb02d20f461b10
-
SHA256
b7f44e1ffd260f950508d3626d6074c040e02bb1e42a6f0ee4f1bd1f03634593
-
SHA512
af861b48d2041a72fc96673875b6b70d60911125bdad0e6a995032c87c720b5575d2c9637f6ebd8fa4b33b83b2f7c7f4eac2f04634481a9d999c7a7983ad35f4
-
SSDEEP
24576:XqbWtC5lXZZE139qNH1g4Gc7tqd8PeHnieZFWqz:XqbaCnXZZENMMchs8PwiIFxz
Static task
static1
Behavioral task
behavioral1
Sample
b7f44e1ffd260f950508d3626d6074c040e02bb1e42a6f0ee4f1bd1f03634593.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
b7f44e1ffd260f950508d3626d6074c040e02bb1e42a6f0ee4f1bd1f03634593.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
b7f44e1ffd260f950508d3626d6074c040e02bb1e42a6f0ee4f1bd1f03634593.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
b7f44e1ffd260f950508d3626d6074c040e02bb1e42a6f0ee4f1bd1f03634593
-
Size
893KB
-
MD5
7c0d4d41874e7108c34f8a3f8d8b0382
-
SHA1
cf10c9e19ca049e233ce939e52cb02d20f461b10
-
SHA256
b7f44e1ffd260f950508d3626d6074c040e02bb1e42a6f0ee4f1bd1f03634593
-
SHA512
af861b48d2041a72fc96673875b6b70d60911125bdad0e6a995032c87c720b5575d2c9637f6ebd8fa4b33b83b2f7c7f4eac2f04634481a9d999c7a7983ad35f4
-
SSDEEP
24576:XqbWtC5lXZZE139qNH1g4Gc7tqd8PeHnieZFWqz:XqbaCnXZZENMMchs8PwiIFxz
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-