General
-
Target
inat-box-v13.apk
-
Size
10.7MB
-
Sample
231022-tng2tsae6v
-
MD5
eb1614b8aa7e277b934c33889e6fe758
-
SHA1
0b6f1fbbf0fe18d017cee9908c9476c704caa856
-
SHA256
1127824498725bf2a688bef75ec3fb56e7dd658295f79017c9ca268b75c96079
-
SHA512
c1d1052bf0839584b72f4a82ac55dfb7c5c6b109c881e86dbc8f8f37da9ca450b201efca8b303e33ca78cec670c27a59cd3cc3220893476cfaff6cba7de1ff95
-
SSDEEP
196608:LraxZVFeCS7QKdsqi09LaTmRKk1SYRhKg2qAkONdgFs9KrkRkaEtXZ:C6ZsX0gTMKkMYRhKv9kONdcXrLp
Static task
static1
Behavioral task
behavioral1
Sample
inat-box-v13.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral2
Sample
inat-box-v13.apk
Resource
android-x64-arm64-20231020-en
Behavioral task
behavioral3
Sample
inat-box-v13.apk
Resource
android-x86-arm-20231020-en
Malware Config
Targets
-
-
Target
inat-box-v13.apk
-
Size
10.7MB
-
MD5
eb1614b8aa7e277b934c33889e6fe758
-
SHA1
0b6f1fbbf0fe18d017cee9908c9476c704caa856
-
SHA256
1127824498725bf2a688bef75ec3fb56e7dd658295f79017c9ca268b75c96079
-
SHA512
c1d1052bf0839584b72f4a82ac55dfb7c5c6b109c881e86dbc8f8f37da9ca450b201efca8b303e33ca78cec670c27a59cd3cc3220893476cfaff6cba7de1ff95
-
SSDEEP
196608:LraxZVFeCS7QKdsqi09LaTmRKk1SYRhKg2qAkONdgFs9KrkRkaEtXZ:C6ZsX0gTMKkMYRhKv9kONdcXrLp
Score7/10-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-