General
-
Target
496E20EB04C7FB0FD64A1D3B519CB2515656E0486253F376176FDC996EFEBD16.apk
-
Size
5.6MB
-
Sample
231210-mm42msdagp
-
MD5
787d01d67c2a0d4df7f100c8550e92b3
-
SHA1
e71d636f44d4b5240c1d743d2c3164ca7ee0fbb6
-
SHA256
496e20eb04c7fb0fd64a1d3b519cb2515656e0486253f376176fdc996efebd16
-
SHA512
a86c7c7ca152cf49273d3d157a04156a30e42b366b7ccbb2bf078cbdd7612862c8d520d1849f868c3dea26ea9f9951e2020686aa12eeff8f42457d554282b112
-
SSDEEP
98304:jWvbn+hU4MIVGAxWWCICz95kP5zC/kRnvTzXDW640lfitWBacyjywQpHuGc4qL9l:JU2YnkRnHXDWx0RiQdyjynFAL9l
Behavioral task
behavioral1
Sample
496E20EB04C7FB0FD64A1D3B519CB2515656E0486253F376176FDC996EFEBD16.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
496E20EB04C7FB0FD64A1D3B519CB2515656E0486253F376176FDC996EFEBD16.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
496E20EB04C7FB0FD64A1D3B519CB2515656E0486253F376176FDC996EFEBD16.apk
Resource
android-x64-arm64-20231023-en
Malware Config
Targets
-
-
Target
496E20EB04C7FB0FD64A1D3B519CB2515656E0486253F376176FDC996EFEBD16.apk
-
Size
5.6MB
-
MD5
787d01d67c2a0d4df7f100c8550e92b3
-
SHA1
e71d636f44d4b5240c1d743d2c3164ca7ee0fbb6
-
SHA256
496e20eb04c7fb0fd64a1d3b519cb2515656e0486253f376176fdc996efebd16
-
SHA512
a86c7c7ca152cf49273d3d157a04156a30e42b366b7ccbb2bf078cbdd7612862c8d520d1849f868c3dea26ea9f9951e2020686aa12eeff8f42457d554282b112
-
SSDEEP
98304:jWvbn+hU4MIVGAxWWCICz95kP5zC/kRnvTzXDW640lfitWBacyjywQpHuGc4qL9l:JU2YnkRnHXDWx0RiQdyjynFAL9l
Score10/10-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-