General
-
Target
prog.apk
-
Size
20.5MB
-
Sample
230203-c1apvadd2s
-
MD5
030a9c431d5e727fa64ec62594c2294c
-
SHA1
504d31a225a796538ffc5957d2145610ceaca570
-
SHA256
48778d60d4c68b219a1697868e93444c29a6d5293cdc68910cad6d3711a682cf
-
SHA512
a8ed7cc27b0c1d3a778d136744f3c2b3b9d7f628112c1f35918c11dc0caaacff21e4765b426a91eefa2dd7dc0679044f75ad9bbcdd26f90b02343cba52c68ee5
-
SSDEEP
393216:7YvsJA35z7A79L+n+T1mbgafiubcwZ3bzT9i/zVN2I+TXQBiKpPbNiRSKcsGJP:k0JA35z7c5v5mbBffcK3pi/zVN2IkAIs
Static task
static1
Behavioral task
behavioral1
Sample
prog.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
prog.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
prog.apk
-
Size
20.5MB
-
MD5
030a9c431d5e727fa64ec62594c2294c
-
SHA1
504d31a225a796538ffc5957d2145610ceaca570
-
SHA256
48778d60d4c68b219a1697868e93444c29a6d5293cdc68910cad6d3711a682cf
-
SHA512
a8ed7cc27b0c1d3a778d136744f3c2b3b9d7f628112c1f35918c11dc0caaacff21e4765b426a91eefa2dd7dc0679044f75ad9bbcdd26f90b02343cba52c68ee5
-
SSDEEP
393216:7YvsJA35z7A79L+n+T1mbgafiubcwZ3bzT9i/zVN2I+TXQBiKpPbNiRSKcsGJP:k0JA35z7c5v5mbBffcK3pi/zVN2IkAIs
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-