General
-
Target
https://s.id/1ORCR
-
Sample
230705-n2dzfade7s
Score
9/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s.id/1ORCR
Resource
android-x86-arm-20230621-en
android-9-x86
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
https://s.id/1ORCR
Resource
android-x64-20230621-en
android-10-x64
0 signatures
150 seconds
Behavioral task
behavioral3
Sample
https://s.id/1ORCR
Resource
android-x64-arm64-20230621-en
android-11-x64
0 signatures
150 seconds
Malware Config
Targets
-
-
Target
https://s.id/1ORCR
Score9/10-
Renames multiple (62) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Removes a system notification.
-