General
-
Target
270d497ee41c6864c0a48dadc8e5552b236cb3caf75d963c23cc8a446de49464
-
Size
20.5MB
-
Sample
231101-cjgrtsba43
-
MD5
f87804f12173be8a9d3d0c89d7e948ee
-
SHA1
3c29fc202e37c964f8e031541552881baca7f452
-
SHA256
270d497ee41c6864c0a48dadc8e5552b236cb3caf75d963c23cc8a446de49464
-
SHA512
58436ab21754815a06024319a243304565a01b5de099dfda8e755b7596285eafe1fac82ac18fbf8dc2e0a859b4e6bdd4b528437aed8331ec7456b4701b12dc71
-
SSDEEP
393216:NZASsJA35z7A79L+XeF1mbgafiubchZfbrT9i/zVN2I+TX05kKpPbNiRSKcs8J1:NZAtJA35z7c5HDmbBffc3fRi/zVN2Ik0
Static task
static1
Behavioral task
behavioral1
Sample
270d497ee41c6864c0a48dadc8e5552b236cb3caf75d963c23cc8a446de49464.apk
Resource
android-x86-arm-20231023-en
Malware Config
Targets
-
-
Target
270d497ee41c6864c0a48dadc8e5552b236cb3caf75d963c23cc8a446de49464
-
Size
20.5MB
-
MD5
f87804f12173be8a9d3d0c89d7e948ee
-
SHA1
3c29fc202e37c964f8e031541552881baca7f452
-
SHA256
270d497ee41c6864c0a48dadc8e5552b236cb3caf75d963c23cc8a446de49464
-
SHA512
58436ab21754815a06024319a243304565a01b5de099dfda8e755b7596285eafe1fac82ac18fbf8dc2e0a859b4e6bdd4b528437aed8331ec7456b4701b12dc71
-
SSDEEP
393216:NZASsJA35z7A79L+XeF1mbgafiubchZfbrT9i/zVN2I+TX05kKpPbNiRSKcs8J1:NZAtJA35z7c5HDmbBffc3fRi/zVN2Ik0
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-