General
-
Target
58b23e37d2c21f9c5bb879563d42a846
-
Size
30.6MB
-
Sample
231219-tkzsgadfg2
-
MD5
58b23e37d2c21f9c5bb879563d42a846
-
SHA1
7727e5df9e2cf0c9268d587a61423bcb2f8071f7
-
SHA256
dadd500d99efd2f2c88ff96616225acc3bbc163e2bf2365b3b33e01e7e854c19
-
SHA512
d94388336b42d7d1154877185cb494fce960f746c91cf412f24caf1b7c6ced1d838bea19b89bf09061d54e7527a43fca36baf43808aa2475b0e9655b71d9769b
-
SSDEEP
786432:2JooILqisBOchc/zawzJBlc2dz47u9n54tOzEadI:foI7GOzaM+q9n54tO7C
Static task
static1
Behavioral task
behavioral1
Sample
58b23e37d2c21f9c5bb879563d42a846.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
58b23e37d2c21f9c5bb879563d42a846.apk
Resource
android-x64-20231215-en
Malware Config
Targets
-
-
Target
58b23e37d2c21f9c5bb879563d42a846
-
Size
30.6MB
-
MD5
58b23e37d2c21f9c5bb879563d42a846
-
SHA1
7727e5df9e2cf0c9268d587a61423bcb2f8071f7
-
SHA256
dadd500d99efd2f2c88ff96616225acc3bbc163e2bf2365b3b33e01e7e854c19
-
SHA512
d94388336b42d7d1154877185cb494fce960f746c91cf412f24caf1b7c6ced1d838bea19b89bf09061d54e7527a43fca36baf43808aa2475b0e9655b71d9769b
-
SSDEEP
786432:2JooILqisBOchc/zawzJBlc2dz47u9n54tOzEadI:foI7GOzaM+q9n54tO7C
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks Android system properties for emulator presence.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-