Overview
overview
7Static
static
71b54a48f44...d0.apk
android-9-x86
71b54a48f44...d0.apk
android-10-x64
7consentform.html
windows7-x64
1consentform.html
windows10-2004-x64
1peer5.html
windows7-x64
1peer5.html
windows10-2004-x64
1resources.ps1
windows7-x64
1resources.ps1
windows10-2004-x64
1scripts-retry.js
windows7-x64
1scripts-retry.js
windows10-2004-x64
1text-encod...ill.js
windows7-x64
1text-encod...ill.js
windows10-2004-x64
1General
-
Target
1b54a48f444efbbe7a6da06b431b97f118ba245619242611e601bc250a56bfd0.apk.zip
-
Size
23.2MB
-
Sample
231007-3k7yhsae72
-
MD5
487c22c62c29b0d8d1960694cd8fc96e
-
SHA1
6d1eae0bb799ab84f41c4285a171d374e1ca6cc4
-
SHA256
e69e18d209029d4f5985a1655999f72b5146a3a4e6cd926cb7a6ecaa913f3b40
-
SHA512
d9f745a4f0b11cd8b210a8f9bce0069f29993dd6cfc3ef0c464061d42c9ab90efa676bbd9b5ec2fe85c7c63805e94469765663df508c72e0999b44ec5107ed59
-
SSDEEP
393216:xc2lsSGjA/uEaIxXOmoW3i4pAz1w8sDv+MvVMDbzrJjh/hvEaAHlkOLnSRZtjNll:xv6RjAmEaIx+mn7WwoImDhvv0l5Suf/K
Static task
static1
Behavioral task
behavioral1
Sample
1b54a48f444efbbe7a6da06b431b97f118ba245619242611e601bc250a56bfd0.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
1b54a48f444efbbe7a6da06b431b97f118ba245619242611e601bc250a56bfd0.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
consentform.html
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
consentform.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
peer5.html
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
peer5.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
resources.ps1
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
resources.ps1
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
scripts-retry.js
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
scripts-retry.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
text-encoder-polyfill.js
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
text-encoder-polyfill.js
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
1b54a48f444efbbe7a6da06b431b97f118ba245619242611e601bc250a56bfd0.apk
-
Size
24.6MB
-
MD5
79bc5beac5c671f689846e3f70080e29
-
SHA1
801571ad6c869ee5c885ce94fb620fe552d37892
-
SHA256
1b54a48f444efbbe7a6da06b431b97f118ba245619242611e601bc250a56bfd0
-
SHA512
e88e31d3aa5459547c4fbbb959ea005cc1b7c05a1f063befe1f34f064cb64e3f4fae440bd9670eb735c3ebba7397bee2d70fa4e4601f7f0c24bd7460f8fff28f
-
SSDEEP
393216:Nb4jtHx3iTf45mgKXyo/oVAR0/sxtkvQ6OeKekOnmDWLxOpydzdE3ThamX:ilxWfRgKX//ttxH7Izd0hX
Score7/10-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
-
-
Target
consentform.html
-
Size
27KB
-
MD5
7a2ed1a6df8839dd8936a86d9edccabe
-
SHA1
7bc1af528444afca678905059cb1ba9fade65352
-
SHA256
d02fbd55c1b5da3fa1f77c52f5633421395a3bf228457521512b37cdacd65f9c
-
SHA512
ea0c3e512b37e340f4c0a49196344f1dd5aef38c469ba124605518e913be601a5b6a92a50f00e962bc90041bb80e51480254c7902032d894b7d24be5aec47097
-
SSDEEP
768:wEh4FOT6bJdK0D7fkvaqF1b6cY4c5rC28c54NTc5Jt:th44GbJdKoncY4c5Wc5wc57
Score1/10 -
-
-
Target
peer5.html
-
Size
926B
-
MD5
84982326a36a3d3b545678ad6af8fe64
-
SHA1
5114906e8587d95d2c34d428fa42a76d23f4b679
-
SHA256
dd9ef5a32ccff77d35b73d6ae2a67655adc54314394aae4806f773140d06cdd7
-
SHA512
a4df403f2af6e1bf8ded56ae274ebd8edf5aa4576dd1692829c8c70b6f6e2e58c417429d45c9545b4c7fc6aff7ff3fb75c3cbbdb1e1345c56f62341ecccc5333
Score1/10 -
-
-
Target
resources.dat
-
Size
36KB
-
MD5
fd5b19c7bff96ec112055648c6777147
-
SHA1
db98c4474b7e660e2686adb23a22458cff5cd0d4
-
SHA256
d59471a645617fb7d141895f81b9589589ec58c61e9b9b172d4797f846575f8c
-
SHA512
b73909f172f151022a1d2684b098e13e6301ef82d50bc58572a0b0e880ac55ff7aab0175724cd3a60481c1e24d540e4ccd93dddd8a4f23e05f1bb7e9c9acc48d
-
SSDEEP
768:tXDmicYRb63m9ROdT1Ck+SKb8cxAoQKyhXPQoHbatOL:dCicqbNX4Tck+37xA7XhHOwL
Score1/10 -
-
-
Target
scripts-retry.js
-
Size
793B
-
MD5
d6209a824e735c8c9a90a603badf9a20
-
SHA1
0fd110d17a54d49a08fbaa793b1f800209d574f9
-
SHA256
f18e157e1bfa1a7324d769da707370102f25d2a21946b91782dcb028538b9ee4
-
SHA512
d9573f6e9614614d8ed5432e6e5f6bed28bd38256652793e11636bc6843b36680d7ec973f76ba203507a1637baa54dd26d34a2ddb5f642f08c9e4f3af82726aa
Score1/10 -
-
-
Target
text-encoder-polyfill.js
-
Size
536KB
-
MD5
b59c00b274f12a5f668d970f73c109db
-
SHA1
4e74bddd9d5dbc116e47282716f9d0d25fb02ba2
-
SHA256
41d3548c8be23915786deb808bd7560dca2432981da1015189f5b0e3e2eaddaa
-
SHA512
4118ad4cd3c7b4ad119c05f70f456f44b3d6ac93706b21b5d5c45cfc4f53e29cf684c581f14d64a403771cfba1fad2855232822d676517ad1fa27be82d186638
-
SSDEEP
1536:neEVgMwyyZmjsGG20zUdVZKW4XVDSPSn8iYgOJHiLxPxseMe3McJkQBY5fD43Z3O:o4l/X4w
Score1/10 -