General
-
Target
eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003
-
Size
20.5MB
-
Sample
230202-cys4eagb7z
-
MD5
5db9c9ef5d4d5d385a248364d867df17
-
SHA1
12b255036ed20285c7ed04e46c1a8274ec552a96
-
SHA256
eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003
-
SHA512
a41379dcc0acd8d8fd8fb5eb4d15ff45c1043161dd7490466ce1d8e7597e636650b05677e0592cf7941c55dec42ba164e313d1654c7911e0b1919b4fa4c70c00
-
SSDEEP
393216:sJGssJA35z7A79L+xaJ1mbgafiubciZTbrT9i/zVN2I+TXKtqKpPbNiRSKcsAJ1:yaJA35z7c5B/mbBffc4TBi/zVN2IkaMG
Static task
static1
Behavioral task
behavioral1
Sample
eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003.apk
Resource
android-x64-20220823-en
Malware Config
Targets
-
-
Target
eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003
-
Size
20.5MB
-
MD5
5db9c9ef5d4d5d385a248364d867df17
-
SHA1
12b255036ed20285c7ed04e46c1a8274ec552a96
-
SHA256
eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003
-
SHA512
a41379dcc0acd8d8fd8fb5eb4d15ff45c1043161dd7490466ce1d8e7597e636650b05677e0592cf7941c55dec42ba164e313d1654c7911e0b1919b4fa4c70c00
-
SSDEEP
393216:sJGssJA35z7A79L+xaJ1mbgafiubciZTbrT9i/zVN2I+TXKtqKpPbNiRSKcsAJ1:yaJA35z7c5B/mbBffc4TBi/zVN2IkaMG
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-