General
-
Target
034e7a00d9cb47e9f43363d7977cbfa7.apk
-
Size
6.3MB
-
Sample
230530-hvwm1sga23
-
MD5
034e7a00d9cb47e9f43363d7977cbfa7
-
SHA1
9b4cee824f9bac058d6ffe75f0f1240a487f8961
-
SHA256
bfbf60df6f0bb98938f5a0a4f04cd55864d526ebfc634abe0ae747889583c92d
-
SHA512
89c3b88206ee699e42d8811399cc40e7ba9812d2e29c7b40c71cdb132730aaf75fd938513d3edfd2acb3f04e37baadb1cbfdb64f4e14a3deec34f37c8405fce2
-
SSDEEP
196608:g50ct0wEXrt9FmO/wlHyJy7OY0aBB6SKobhY:86X7FUypY0a0
Static task
static1
Behavioral task
behavioral1
Sample
034e7a00d9cb47e9f43363d7977cbfa7.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
034e7a00d9cb47e9f43363d7977cbfa7.apk
-
Size
6.3MB
-
MD5
034e7a00d9cb47e9f43363d7977cbfa7
-
SHA1
9b4cee824f9bac058d6ffe75f0f1240a487f8961
-
SHA256
bfbf60df6f0bb98938f5a0a4f04cd55864d526ebfc634abe0ae747889583c92d
-
SHA512
89c3b88206ee699e42d8811399cc40e7ba9812d2e29c7b40c71cdb132730aaf75fd938513d3edfd2acb3f04e37baadb1cbfdb64f4e14a3deec34f37c8405fce2
-
SSDEEP
196608:g50ct0wEXrt9FmO/wlHyJy7OY0aBB6SKobhY:86X7FUypY0a0
Score9/10-
Renames multiple (56) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-