General
-
Target
35338e58becc1717f33ddeac452ca1a8.apk
-
Size
8.7MB
-
Sample
230516-hflt9sab9s
-
MD5
35338e58becc1717f33ddeac452ca1a8
-
SHA1
a2b287b6d656c5f7da626db11d6f3c947d24f610
-
SHA256
78d46fe8dcb039b082e7552cb1c0e10fa4c28e30d15911c71a05e3ab5ed6199f
-
SHA512
02a65029c603847dffaece2126852e4a496f8d505ac72733b0edeff4cb671ea7f96458914766ae64e7f108a8e3767bd022367d6667587ff1cea1658a0ba754d5
-
SSDEEP
196608:yOFqan6gqBkCWWLXKNMpeRjO35+DsCWbkCqlNYYed5Wly6Rarz3:yOFf6hkXiXKNo3AsCWbkC2YYIW5arz3
Static task
static1
Behavioral task
behavioral1
Sample
35338e58becc1717f33ddeac452ca1a8.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
35338e58becc1717f33ddeac452ca1a8.apk
-
Size
8.7MB
-
MD5
35338e58becc1717f33ddeac452ca1a8
-
SHA1
a2b287b6d656c5f7da626db11d6f3c947d24f610
-
SHA256
78d46fe8dcb039b082e7552cb1c0e10fa4c28e30d15911c71a05e3ab5ed6199f
-
SHA512
02a65029c603847dffaece2126852e4a496f8d505ac72733b0edeff4cb671ea7f96458914766ae64e7f108a8e3767bd022367d6667587ff1cea1658a0ba754d5
-
SSDEEP
196608:yOFqan6gqBkCWWLXKNMpeRjO35+DsCWbkCqlNYYed5Wly6Rarz3:yOFf6hkXiXKNo3AsCWbkC2YYIW5arz3
Score7/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-