General
-
Target
27a739d802e34dace763ff8ccb685b176632d9f552ae2e9fe6a900b6379269da
-
Size
15.5MB
-
Sample
230215-j6ez3saf3z
-
MD5
6ea0abebd9068e9b510314cab30427b3
-
SHA1
5a726291a97aa0f446b9fa080aea1d7d95fa91af
-
SHA256
27a739d802e34dace763ff8ccb685b176632d9f552ae2e9fe6a900b6379269da
-
SHA512
a611a6e6f0f8700c4434cf380028329502a3362f710158c15f6c17febbec4c371d8a4b708037de88f1767e1424d5378f969b8d997b1df7e7cd267c92f25e525b
-
SSDEEP
393216:1weTfLRfwzXdf2F74B++cYy8pArIh8qK6OjlSMV/AWz84T:1webLR6QFklv9K6gw87A4T
Static task
static1
Behavioral task
behavioral1
Sample
27a739d802e34dace763ff8ccb685b176632d9f552ae2e9fe6a900b6379269da.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
27a739d802e34dace763ff8ccb685b176632d9f552ae2e9fe6a900b6379269da
-
Size
15.5MB
-
MD5
6ea0abebd9068e9b510314cab30427b3
-
SHA1
5a726291a97aa0f446b9fa080aea1d7d95fa91af
-
SHA256
27a739d802e34dace763ff8ccb685b176632d9f552ae2e9fe6a900b6379269da
-
SHA512
a611a6e6f0f8700c4434cf380028329502a3362f710158c15f6c17febbec4c371d8a4b708037de88f1767e1424d5378f969b8d997b1df7e7cd267c92f25e525b
-
SSDEEP
393216:1weTfLRfwzXdf2F74B++cYy8pArIh8qK6OjlSMV/AWz84T:1webLR6QFklv9K6gw87A4T
Score8/10-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-