General
-
Target
fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841
-
Size
2.7MB
-
Sample
231012-mrcsysdf9v
-
MD5
fc54078c5ae26d856109d306c37909ae
-
SHA1
8beab9e454b5283e892aeca6bca9afb608fa8718
-
SHA256
fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841
-
SHA512
2b3b3bff34a833c1cbeee7b280dcf70364bf9d3bcaa6c9c13a192257e979c1457abf113f1c75a02639a8f8fb302f453efcde9a1103fee87dfeea188fff28acdd
-
SSDEEP
49152:1+GXVzVoug3HVnBkzUpz1p59ze+WuGnnlUxA2Uf+Vv9exf7N74bLWSSHV5jgdXOC:TXnoug3ZBt3/3W9nIUfc0fh4/wzeth
Behavioral task
behavioral1
Sample
fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841.apk
Resource
android-x64-arm64-20230831-en
Malware Config
Extracted
caprarat
MSK-2023
ptzbubble.shop:14862
Targets
-
-
Target
fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841
-
Size
2.7MB
-
MD5
fc54078c5ae26d856109d306c37909ae
-
SHA1
8beab9e454b5283e892aeca6bca9afb608fa8718
-
SHA256
fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841
-
SHA512
2b3b3bff34a833c1cbeee7b280dcf70364bf9d3bcaa6c9c13a192257e979c1457abf113f1c75a02639a8f8fb302f453efcde9a1103fee87dfeea188fff28acdd
-
SSDEEP
49152:1+GXVzVoug3HVnBkzUpz1p59ze+WuGnnlUxA2Uf+Vv9exf7N74bLWSSHV5jgdXOC:TXnoug3ZBt3/3W9nIUfc0fh4/wzeth
Score6/10-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-