General
-
Target
chrome.apk
-
Size
277KB
-
Sample
230206-awrfpaeh3x
-
MD5
cf704d6b0ec8351e403c1bb5abb47d0d
-
SHA1
c5010bbb27741a6136e2e6bb6cd9a77ad5404ecc
-
SHA256
1526ce6aa629ae1fbd763cd4e36e13d31e0e8ed0a2947812e670afb2089d886a
-
SHA512
e759bcebf576d01901b15c72b8fb9c3c039792b9231f975a30b4a7f28dd07fe3e0e376ecb25f76143f2052f6e0297e921465e62823c1a7345ced0b759f729302
-
SSDEEP
6144:K62sPC+1iD1gZKpoyIzXR9tFe3mK5tVfHrcxqXiTU/4hWAZ80jmjIEQ:ksPC+AGcIzBNeWK5thLcx4i4nAHjU+
Static task
static1
Behavioral task
behavioral1
Sample
chrome.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
chrome.apk
-
Size
277KB
-
MD5
cf704d6b0ec8351e403c1bb5abb47d0d
-
SHA1
c5010bbb27741a6136e2e6bb6cd9a77ad5404ecc
-
SHA256
1526ce6aa629ae1fbd763cd4e36e13d31e0e8ed0a2947812e670afb2089d886a
-
SHA512
e759bcebf576d01901b15c72b8fb9c3c039792b9231f975a30b4a7f28dd07fe3e0e376ecb25f76143f2052f6e0297e921465e62823c1a7345ced0b759f729302
-
SSDEEP
6144:K62sPC+1iD1gZKpoyIzXR9tFe3mK5tVfHrcxqXiTU/4hWAZ80jmjIEQ:ksPC+AGcIzBNeWK5thLcx4i4nAHjU+
Score7/10-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Uses Crypto APIs (Might try to encrypt user data).
-