General
-
Target
6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385
-
Size
13.9MB
-
Sample
231219-3vqf8ahgbp
-
MD5
7f3656e61cd44c0f443144bee9487b39
-
SHA1
d4b66edd007f8ab5d7c3037ef108262a7345929f
-
SHA256
6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385
-
SHA512
56234dbf1470bc7bc01e9fdf7438ef685509bbf354aed5ebc0b6ddb439cec73df707bd42abb285e9b96b4ee377b76d1ef9a89b435780ba2a53070bfb7eaadf1a
-
SSDEEP
393216:PDFhK+o/rll4Xg8X0GhwZIhNigwnDujyf9Sk:PzMQXg8kGh08igUKjyfP
Static task
static1
Behavioral task
behavioral1
Sample
6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385
-
Size
13.9MB
-
MD5
7f3656e61cd44c0f443144bee9487b39
-
SHA1
d4b66edd007f8ab5d7c3037ef108262a7345929f
-
SHA256
6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385
-
SHA512
56234dbf1470bc7bc01e9fdf7438ef685509bbf354aed5ebc0b6ddb439cec73df707bd42abb285e9b96b4ee377b76d1ef9a89b435780ba2a53070bfb7eaadf1a
-
SSDEEP
393216:PDFhK+o/rll4Xg8X0GhwZIhNigwnDujyf9Sk:PzMQXg8kGh08igUKjyfP
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks Android system properties for emulator presence.
-
Reads information about phone network operator.
-