General
-
Target
f39a8aae1c30f1aff5866156803e349c73d94dda
-
Size
1.5MB
-
Sample
230202-qz3wwsad86
-
MD5
1a7e9bf2c807dc4635b1386cfa9babe9
-
SHA1
f39a8aae1c30f1aff5866156803e349c73d94dda
-
SHA256
bd23bdfa621b8cb1a9af3fecc0137fe4e2a428b711b28e4ca2e49c4fc91ec5a4
-
SHA512
6afe42cc9c022433f9aeb19d7d5938ddbfc1bfd253d964c8b2e3341615112f7f2335ac3ce38d90b7874a9453aab3fef1e7f6991b364dcf4fd8b5eff79d43a00d
-
SSDEEP
24576:9SraLHW34NckctO9be4VskC65x9+N9hLGuQVqgNY3Q6T+tHGgYkbk1ZfvUYbk1Zt:VHWIBKohsm5xm9hy1VDaZT0Jk1eIk1e0
Static task
static1
Behavioral task
behavioral1
Sample
f39a8aae1c30f1aff5866156803e349c73d94dda.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
f39a8aae1c30f1aff5866156803e349c73d94dda.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
f39a8aae1c30f1aff5866156803e349c73d94dda.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
f39a8aae1c30f1aff5866156803e349c73d94dda
-
Size
1.5MB
-
MD5
1a7e9bf2c807dc4635b1386cfa9babe9
-
SHA1
f39a8aae1c30f1aff5866156803e349c73d94dda
-
SHA256
bd23bdfa621b8cb1a9af3fecc0137fe4e2a428b711b28e4ca2e49c4fc91ec5a4
-
SHA512
6afe42cc9c022433f9aeb19d7d5938ddbfc1bfd253d964c8b2e3341615112f7f2335ac3ce38d90b7874a9453aab3fef1e7f6991b364dcf4fd8b5eff79d43a00d
-
SSDEEP
24576:9SraLHW34NckctO9be4VskC65x9+N9hLGuQVqgNY3Q6T+tHGgYkbk1ZfvUYbk1Zt:VHWIBKohsm5xm9hy1VDaZT0Jk1eIk1e0
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-