General
-
Target
Delta Executor new.apk
-
Size
131.6MB
-
Sample
231001-f9yptahc3s
-
MD5
d9dbeaae2429dfc7d5fa1f2181c2d6b9
-
SHA1
8c8446e0e908dffd6d764c6dec1ead57979f2d23
-
SHA256
1e969eaa13d2d76f5be074a5a00eb7a3c1114493055db88de7074c52a7e97c06
-
SHA512
fa9f1739b21e025239257dac9b75c20eb87ba46c5a18b9a3776adc847f05867eb6b510377857d37f5e3ee66ab59f9de183bbc0e220055fe1ea03b502ab733e52
-
SSDEEP
3145728:+vlLbKcQjVzNyK9InobmN+d8R6lqhnIwty3EMlSAGIK0W:eMJNkKGnoTK6chnI13EySmK3
Static task
static1
Behavioral task
behavioral1
Sample
Delta Executor new.apk
Resource
android-x86-arm-20230831-en
Malware Config
Targets
-
-
Target
Delta Executor new.apk
-
Size
131.6MB
-
MD5
d9dbeaae2429dfc7d5fa1f2181c2d6b9
-
SHA1
8c8446e0e908dffd6d764c6dec1ead57979f2d23
-
SHA256
1e969eaa13d2d76f5be074a5a00eb7a3c1114493055db88de7074c52a7e97c06
-
SHA512
fa9f1739b21e025239257dac9b75c20eb87ba46c5a18b9a3776adc847f05867eb6b510377857d37f5e3ee66ab59f9de183bbc0e220055fe1ea03b502ab733e52
-
SSDEEP
3145728:+vlLbKcQjVzNyK9InobmN+d8R6lqhnIwty3EMlSAGIK0W:eMJNkKGnoTK6chnI13EySmK3
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-