General
-
Target
5c0bd6d9aedaa6eeac83e94b30ad2a47f10fe5767eeed1e3057891f8b5ddd2e9
-
Size
546KB
-
Sample
221127-p7kjvahf66
-
MD5
5286ba36ab69785d7392a418214a1745
-
SHA1
378ecfaf3f82f58b7cbb4d452effded5aac295ec
-
SHA256
5c0bd6d9aedaa6eeac83e94b30ad2a47f10fe5767eeed1e3057891f8b5ddd2e9
-
SHA512
6fcd8fa675eba571363d8753dfb4d30c01e6361725d77c9900508f7d74166f317d72878d9cd5d28adea342a2ead6ac5347b41df986ed5d5450a40267b93a7a1c
-
SSDEEP
12288:knFxnAd/tQ7mRffKSBmFiv8VBEKlj4hLQp:knbAv/VKSBSvEKlj4tQp
Static task
static1
Behavioral task
behavioral1
Sample
5c0bd6d9aedaa6eeac83e94b30ad2a47f10fe5767eeed1e3057891f8b5ddd2e9.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
5c0bd6d9aedaa6eeac83e94b30ad2a47f10fe5767eeed1e3057891f8b5ddd2e9.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
5c0bd6d9aedaa6eeac83e94b30ad2a47f10fe5767eeed1e3057891f8b5ddd2e9.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
5c0bd6d9aedaa6eeac83e94b30ad2a47f10fe5767eeed1e3057891f8b5ddd2e9
-
Size
546KB
-
MD5
5286ba36ab69785d7392a418214a1745
-
SHA1
378ecfaf3f82f58b7cbb4d452effded5aac295ec
-
SHA256
5c0bd6d9aedaa6eeac83e94b30ad2a47f10fe5767eeed1e3057891f8b5ddd2e9
-
SHA512
6fcd8fa675eba571363d8753dfb4d30c01e6361725d77c9900508f7d74166f317d72878d9cd5d28adea342a2ead6ac5347b41df986ed5d5450a40267b93a7a1c
-
SSDEEP
12288:knFxnAd/tQ7mRffKSBmFiv8VBEKlj4hLQp:knbAv/VKSBSvEKlj4tQp
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-