General
-
Target
0fa2123c662af5f3da5b2a3a11f47ae5
-
Size
13.5MB
-
Sample
231219-m56cesbae7
-
MD5
0fa2123c662af5f3da5b2a3a11f47ae5
-
SHA1
60ecd865c5e5d9bc9bab6d0515878cf793e83f1c
-
SHA256
8a6486c5895eda9a75f3bb09eeeb1d0d46b25939bb191b3be8d9d319e2e57efa
-
SHA512
bfe7b2a4ddf69e296a4df7ed14498b21a16a1bca5b48c8c9ad38c556ede184f9cfb87725166bdc3e57d5a66dd13817910a193e0d2e8dffd60338010527ce6433
-
SSDEEP
393216:iXgo7SmuC8+q/ZM9MVCcEy3iX3suhj7BM:kuC8D/ZtgcEy3iX3sWK
Static task
static1
Behavioral task
behavioral1
Sample
0fa2123c662af5f3da5b2a3a11f47ae5.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
0fa2123c662af5f3da5b2a3a11f47ae5.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
0fa2123c662af5f3da5b2a3a11f47ae5
-
Size
13.5MB
-
MD5
0fa2123c662af5f3da5b2a3a11f47ae5
-
SHA1
60ecd865c5e5d9bc9bab6d0515878cf793e83f1c
-
SHA256
8a6486c5895eda9a75f3bb09eeeb1d0d46b25939bb191b3be8d9d319e2e57efa
-
SHA512
bfe7b2a4ddf69e296a4df7ed14498b21a16a1bca5b48c8c9ad38c556ede184f9cfb87725166bdc3e57d5a66dd13817910a193e0d2e8dffd60338010527ce6433
-
SSDEEP
393216:iXgo7SmuC8+q/ZM9MVCcEy3iX3suhj7BM:kuC8D/ZtgcEy3iX3sWK
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-