General
-
Target
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba
-
Size
2.9MB
-
Sample
231219-3vgt3shfhl
-
MD5
b0c5b2b4d6678c9faa5140a040a1ab73
-
SHA1
ca101ddfcf6746ffa171dc3a0545ebd017bf689a
-
SHA256
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba
-
SHA512
4ac35472e292b4491e96d32ccd73f73fef10ed90070bcc16d1c69b0c800762a47fde01871a75274b2036eeb76705767c9a4d282e1f57bf55931da9011195e2fd
-
SSDEEP
49152:duRML7jNf7mUqyKD/09lXUKhoHvoiUc/l9tZ5yHKhs76ry5K+X6j1VHzfjqD:1jN7xLG/Ul70RUcN9tXkj7eH+Xu1JzfS
Behavioral task
behavioral1
Sample
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba
-
Size
2.9MB
-
MD5
b0c5b2b4d6678c9faa5140a040a1ab73
-
SHA1
ca101ddfcf6746ffa171dc3a0545ebd017bf689a
-
SHA256
6eeb683ee4674fd5553fdc2ca32d77ee733de0e654c6f230f881abf5752696ba
-
SHA512
4ac35472e292b4491e96d32ccd73f73fef10ed90070bcc16d1c69b0c800762a47fde01871a75274b2036eeb76705767c9a4d282e1f57bf55931da9011195e2fd
-
SSDEEP
49152:duRML7jNf7mUqyKD/09lXUKhoHvoiUc/l9tZ5yHKhs76ry5K+X6j1VHzfjqD:1jN7xLG/Ul70RUcN9tXkj7eH+Xu1JzfS
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-