General
-
Target
Truecaller_v13.6.4-MD-arm64.apk
-
Size
76.7MB
-
Sample
230302-fcpewabb5z
-
MD5
3385773c615affb24f66c5894f257bbc
-
SHA1
a6a57fa162e552f011970a5a01c2a1450a5ae4f3
-
SHA256
ae895f723043c99ebd9d49a8155e8166ca914a4af0fbb0b5ba4a80eead699025
-
SHA512
2f0c8f070aa01e5d17e16344241c2275a5294c948b20b0cbd13445f76316c3e421f72206f6e42ef2a3ab8b60f5de4a02a34da00ab973aa70453779bbaaf6a8d6
-
SSDEEP
1572864:O27ZJvxXJHk0wxSm62Qvv9gNCDUS3LJn++bUZWYvHMcQCxwvk4dN:Xd19Rk0wxbQ9cQUS3LBzKTvHrQ2wvkGN
Static task
static1
Behavioral task
behavioral1
Sample
Truecaller_v13.6.4-MD-arm64.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
Truecaller_v13.6.4-MD-arm64.apk
-
Size
76.7MB
-
MD5
3385773c615affb24f66c5894f257bbc
-
SHA1
a6a57fa162e552f011970a5a01c2a1450a5ae4f3
-
SHA256
ae895f723043c99ebd9d49a8155e8166ca914a4af0fbb0b5ba4a80eead699025
-
SHA512
2f0c8f070aa01e5d17e16344241c2275a5294c948b20b0cbd13445f76316c3e421f72206f6e42ef2a3ab8b60f5de4a02a34da00ab973aa70453779bbaaf6a8d6
-
SSDEEP
1572864:O27ZJvxXJHk0wxSm62Qvv9gNCDUS3LJn++bUZWYvHMcQCxwvk4dN:Xd19Rk0wxbQ9cQUS3LBzKTvHrQ2wvkGN
Score7/10-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-