General
-
Target
2a61e4bc5c7d24fdc6897473a98f0c42
-
Size
18.5MB
-
Sample
231219-p57xcsgfbr
-
MD5
2a61e4bc5c7d24fdc6897473a98f0c42
-
SHA1
d4f9f046910c85d04e4c50bf43116cd06c800964
-
SHA256
54bbbc9f49b32f57487ba8622677e2eead7920e38050cd1cb2543fc15fcc3732
-
SHA512
f937d995b17b97f705014cf7e69eea08b1a13d7ad6f2975a9531f35ad6b19bede724c34efca9a39e7e3c5a70e0b7e0b3c49b098e5c62a4bf7d20a7fed13fc691
-
SSDEEP
393216:RLR5c9mUuSyklwQ7ZMzzfyS9rw2oY+/okUjg9Ax:i7yCw2AzfySRjoY+/opg0
Static task
static1
Behavioral task
behavioral1
Sample
2a61e4bc5c7d24fdc6897473a98f0c42.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
2a61e4bc5c7d24fdc6897473a98f0c42.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
2a61e4bc5c7d24fdc6897473a98f0c42
-
Size
18.5MB
-
MD5
2a61e4bc5c7d24fdc6897473a98f0c42
-
SHA1
d4f9f046910c85d04e4c50bf43116cd06c800964
-
SHA256
54bbbc9f49b32f57487ba8622677e2eead7920e38050cd1cb2543fc15fcc3732
-
SHA512
f937d995b17b97f705014cf7e69eea08b1a13d7ad6f2975a9531f35ad6b19bede724c34efca9a39e7e3c5a70e0b7e0b3c49b098e5c62a4bf7d20a7fed13fc691
-
SSDEEP
393216:RLR5c9mUuSyklwQ7ZMzzfyS9rw2oY+/okUjg9Ax:i7yCw2AzfySRjoY+/opg0
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-