General
-
Target
be99390edc256f786becb9ca9b0fb5210e18e5d638dfb11b4632012cb6d6c647
-
Size
4.7MB
-
Sample
221128-bvlz9ahh8v
-
MD5
8358de51bf92e74d2e83021021b90d30
-
SHA1
1ff12b20b1404df4b913b18add374fdcbe269adc
-
SHA256
be99390edc256f786becb9ca9b0fb5210e18e5d638dfb11b4632012cb6d6c647
-
SHA512
5c13ed75509dfe0ce267aff23a091e595ad40323ba10a2ab1a3b80c467b383a19b444b878a0db9e5cb5c1cc14e08d98dde3f10fd91c0020d8bbd8ba45c544569
-
SSDEEP
98304:T6n5VlgBEmN1JLdEPjZ8jnduyYZIuL+DsvKbs8f5D4BylUBbk:65VlIzw24Zmxs8R82
Static task
static1
Behavioral task
behavioral1
Sample
be99390edc256f786becb9ca9b0fb5210e18e5d638dfb11b4632012cb6d6c647.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
be99390edc256f786becb9ca9b0fb5210e18e5d638dfb11b4632012cb6d6c647
-
Size
4.7MB
-
MD5
8358de51bf92e74d2e83021021b90d30
-
SHA1
1ff12b20b1404df4b913b18add374fdcbe269adc
-
SHA256
be99390edc256f786becb9ca9b0fb5210e18e5d638dfb11b4632012cb6d6c647
-
SHA512
5c13ed75509dfe0ce267aff23a091e595ad40323ba10a2ab1a3b80c467b383a19b444b878a0db9e5cb5c1cc14e08d98dde3f10fd91c0020d8bbd8ba45c544569
-
SSDEEP
98304:T6n5VlgBEmN1JLdEPjZ8jnduyYZIuL+DsvKbs8f5D4BylUBbk:65VlIzw24Zmxs8R82
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-