General
-
Target
cf3b8c191d379bf86975e1483921e68e88083932
-
Size
468KB
-
Sample
230202-qz6b1scd6z
-
MD5
cbbd3c3868a0f8712631c9798fa20ca4
-
SHA1
cf3b8c191d379bf86975e1483921e68e88083932
-
SHA256
b1d12fced390bc764261e0f2e3064bd8ff9289f3ade17b47f0f8cbb9795c9413
-
SHA512
5d80c206192a6ac30561b9835897d516167d62e597e9feb9d78ad6fa857d1707925fe468874f8a143a890f084a2e34098e02190ba79c5cbb6597c12df07c4797
-
SSDEEP
12288:nfHPsb/emfUvNW9UJwhGZIou3orb87W9t2SmX5HbK:fvG/emfUFWPeISbO42SmX5u
Static task
static1
Behavioral task
behavioral1
Sample
cf3b8c191d379bf86975e1483921e68e88083932.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
cf3b8c191d379bf86975e1483921e68e88083932.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
cf3b8c191d379bf86975e1483921e68e88083932.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
cf3b8c191d379bf86975e1483921e68e88083932
-
Size
468KB
-
MD5
cbbd3c3868a0f8712631c9798fa20ca4
-
SHA1
cf3b8c191d379bf86975e1483921e68e88083932
-
SHA256
b1d12fced390bc764261e0f2e3064bd8ff9289f3ade17b47f0f8cbb9795c9413
-
SHA512
5d80c206192a6ac30561b9835897d516167d62e597e9feb9d78ad6fa857d1707925fe468874f8a143a890f084a2e34098e02190ba79c5cbb6597c12df07c4797
-
SSDEEP
12288:nfHPsb/emfUvNW9UJwhGZIou3orb87W9t2SmX5HbK:fvG/emfUFWPeISbO42SmX5u
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-