General
-
Target
7637386a3b6fa15e1dac596a7a06eca2852ad45521dc8cbb22e26be0d1620952
-
Size
7.5MB
-
Sample
231220-a8d15agag2
-
MD5
1596c6b8ab2b9fa1bb799baa18cd27f9
-
SHA1
f50fca2bf281e311d54460ec740ea2d7d3b7f7f9
-
SHA256
7637386a3b6fa15e1dac596a7a06eca2852ad45521dc8cbb22e26be0d1620952
-
SHA512
3211d6df6c86afeb3bf443c321ee126b8ab54cc9fd53c2257c34b229fed55abd9f47e53dcdeb5d194ce4bf10ee43617cdfcc3d968744c9888b887dbb266f3987
-
SSDEEP
196608:If197IgPQl7erWiZcBEMXJAKu3Ap+uMu40SJW0bnV1hrv0qew:If3I4QleNZc+gu3e+uMZl7bJMw
Static task
static1
Behavioral task
behavioral1
Sample
7637386a3b6fa15e1dac596a7a06eca2852ad45521dc8cbb22e26be0d1620952.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
UPPayPluginEx.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral3
Sample
UPPayPluginEx.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
7637386a3b6fa15e1dac596a7a06eca2852ad45521dc8cbb22e26be0d1620952
-
Size
7.5MB
-
MD5
1596c6b8ab2b9fa1bb799baa18cd27f9
-
SHA1
f50fca2bf281e311d54460ec740ea2d7d3b7f7f9
-
SHA256
7637386a3b6fa15e1dac596a7a06eca2852ad45521dc8cbb22e26be0d1620952
-
SHA512
3211d6df6c86afeb3bf443c321ee126b8ab54cc9fd53c2257c34b229fed55abd9f47e53dcdeb5d194ce4bf10ee43617cdfcc3d968744c9888b887dbb266f3987
-
SSDEEP
196608:If197IgPQl7erWiZcBEMXJAKu3Ap+uMu40SJW0bnV1hrv0qew:If3I4QleNZc+gu3e+uMZl7bJMw
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Reads information about phone network operator.
-
-
-
Target
UPPayPluginEx.apk
-
Size
3.1MB
-
MD5
8912e806d90605b3f9348e5d3572be9c
-
SHA1
9135d9136e89f94d78f2ac8c122422809f371203
-
SHA256
6b61ff101ae5d9e095751f10211553c11b2160885a9f3950ae8a4aed1e552e34
-
SHA512
d5fd451155c5e966cb91b4c82cf891cbc90a69ad2dc9655bb40025aba0a274f8cf1634af719136a496a039b10deab608cd2aa2ccc7d240f91e9b0e60d4bb8ed4
-
SSDEEP
98304:NAsdtkWUqCJghRkx1LoYGwQpRDhxI+7mFM/s:+sdtfUqCJghReU/w2BIIs
Score1/10 -