General
-
Target
71f4f544d0e3516c8ab7bcaa6808c270f407140254155c78b7105a65571973d7
-
Size
8.3MB
-
Sample
231220-ae9wpsdgf5
-
MD5
aecda86eb27797080be91d386f661169
-
SHA1
f4f982caccf915d25e69fb677eab9ef7de585783
-
SHA256
71f4f544d0e3516c8ab7bcaa6808c270f407140254155c78b7105a65571973d7
-
SHA512
fdfda2b1011c4ceb70ba6a74245862206b19ebb35119fc2e022c6b554dbe11410b311527de72f31890202367d2e60600736b4160c9d973aec056440d5c97eb07
-
SSDEEP
196608:tjMA6XUWAtiSE0vno4IBtxhLDSNWAtiZSlRmw/vUcYCjEF7I1iF8La2:tAA67aitklRmwJyF7IMFEa2
Static task
static1
Behavioral task
behavioral1
Sample
71f4f544d0e3516c8ab7bcaa6808c270f407140254155c78b7105a65571973d7.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
71f4f544d0e3516c8ab7bcaa6808c270f407140254155c78b7105a65571973d7
-
Size
8.3MB
-
MD5
aecda86eb27797080be91d386f661169
-
SHA1
f4f982caccf915d25e69fb677eab9ef7de585783
-
SHA256
71f4f544d0e3516c8ab7bcaa6808c270f407140254155c78b7105a65571973d7
-
SHA512
fdfda2b1011c4ceb70ba6a74245862206b19ebb35119fc2e022c6b554dbe11410b311527de72f31890202367d2e60600736b4160c9d973aec056440d5c97eb07
-
SSDEEP
196608:tjMA6XUWAtiSE0vno4IBtxhLDSNWAtiZSlRmw/vUcYCjEF7I1iF8La2:tAA67aitklRmwJyF7IMFEa2
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Reads information about phone network operator.
-