General
-
Target
01ead8895c4b9f1e8d255a497d478b05.apk
-
Size
6.4MB
-
Sample
230530-hm885sfh59
-
MD5
01ead8895c4b9f1e8d255a497d478b05
-
SHA1
bed7c837498b4ef65da42658fdd9ea7a9f9f2b93
-
SHA256
ff67d2b4ddbc15cda3373b68289416f8f1c3a424925272ed2b153af61a1c9f94
-
SHA512
a467d86ca3e5f6134aa18509bfb5b749804080ed1cfe2a9da6a16254709bddf6f8fe73f00e123ee5069b379e536549c958917c9dd28a1f4826c1f1040f318e9a
-
SSDEEP
196608:710sf0K6Nt9FmO/wlHyJy7OY0aBB6SKobh/:pkpFUypY0aL
Static task
static1
Behavioral task
behavioral1
Sample
01ead8895c4b9f1e8d255a497d478b05.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
01ead8895c4b9f1e8d255a497d478b05.apk
-
Size
6.4MB
-
MD5
01ead8895c4b9f1e8d255a497d478b05
-
SHA1
bed7c837498b4ef65da42658fdd9ea7a9f9f2b93
-
SHA256
ff67d2b4ddbc15cda3373b68289416f8f1c3a424925272ed2b153af61a1c9f94
-
SHA512
a467d86ca3e5f6134aa18509bfb5b749804080ed1cfe2a9da6a16254709bddf6f8fe73f00e123ee5069b379e536549c958917c9dd28a1f4826c1f1040f318e9a
-
SSDEEP
196608:710sf0K6Nt9FmO/wlHyJy7OY0aBB6SKobh/:pkpFUypY0aL
Score9/10-
Renames multiple (54) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-