General
-
Target
0fbbf5bca438574f5592ac1f548d5d460ddccb4ad6225087a770b47fb717c427 (1).zip
-
Size
4MB
-
Sample
230328-cbvzgsgd46
-
MD5
f17a0df6c9ca13c8a1082b2db2a754b6
-
SHA1
31d534299175cc7c98dea76a14c441a4bcad0209
-
SHA256
c5a6811eb32bcfdaf8043a253f1eb8c544d46f602042fe351c501194d4f91b80
-
SHA512
2139445ad5a017b7ee00a80118eaed2f1f60b1a534e09fade8d547b827aff7f4e2d0da92f94aa5cd150008f62d8cfaf56ef07d558cc1b657c6ed914cabbeb3a6
-
SSDEEP
98304:eVL/HjuemyTMdsjMWGbuHfR3sicXOPLkeSgUysK8lT/XsIMkk0uDT:cvj1myT6Uma6TXOjSJz5/okE
Static task
static1
Behavioral task
behavioral1
Sample
0fbbf5bca438574f5592ac1f548d5d460ddccb4ad6225087a770b47fb717c427.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
0fbbf5bca438574f5592ac1f548d5d460ddccb4ad6225087a770b47fb717c427.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral3
Sample
0fbbf5bca438574f5592ac1f548d5d460ddccb4ad6225087a770b47fb717c427.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
0fbbf5bca438574f5592ac1f548d5d460ddccb4ad6225087a770b47fb717c427
-
Size
5MB
-
MD5
ac71c730698b63a8fa3bcf2ba00ba35b
-
SHA1
90351140fa08992ac29f80a9a4466e05228a3e5d
-
SHA256
0fbbf5bca438574f5592ac1f548d5d460ddccb4ad6225087a770b47fb717c427
-
SHA512
a28b4e01fc0f78bdd101fafae29851ad4b916f449144ecddba35f269c8d397d3cc8ca60caea3d8db982897bdf100836021de1706d18f21cd86fb34ad4444cc88
-
SSDEEP
98304:zNdSPANRI/eYFzsyRy9XDG992B0oOvdAEpAmdy5FoQ/1NL9NlZa/I4MbcBMRpw7:m4ResyUdGb2BcVAGrdIFoQ/1NdZwfZ
Score7/10-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-