General
-
Target
7b24d27c9cede2fdc2a4b7707c2065082bbc1b039770234fb21096812b0e346c
-
Size
28.3MB
-
Sample
231220-b71deafcak
-
MD5
c43501e33bdfc1784c800eb1413e2615
-
SHA1
39cfff621197b4df2fc2adce911591b0191e4244
-
SHA256
7b24d27c9cede2fdc2a4b7707c2065082bbc1b039770234fb21096812b0e346c
-
SHA512
f91b19c40463f8b7499b8ed1878048ad485085ee54fab041e491183649efbdff83aa1b48a246c661a1013e09feecf0b7b84a795f59088327989bb87fb432c84e
-
SSDEEP
393216:kVIN4X0ytqhi24tPypiGYNNieT4XCZzmEtElTARkh21EdP9420zicqHsz3rSwN3p:cIN4X0UzjG8JGGu4SFc2cqMz3rfgm
Static task
static1
Behavioral task
behavioral1
Sample
7b24d27c9cede2fdc2a4b7707c2065082bbc1b039770234fb21096812b0e346c.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
7b24d27c9cede2fdc2a4b7707c2065082bbc1b039770234fb21096812b0e346c
-
Size
28.3MB
-
MD5
c43501e33bdfc1784c800eb1413e2615
-
SHA1
39cfff621197b4df2fc2adce911591b0191e4244
-
SHA256
7b24d27c9cede2fdc2a4b7707c2065082bbc1b039770234fb21096812b0e346c
-
SHA512
f91b19c40463f8b7499b8ed1878048ad485085ee54fab041e491183649efbdff83aa1b48a246c661a1013e09feecf0b7b84a795f59088327989bb87fb432c84e
-
SSDEEP
393216:kVIN4X0ytqhi24tPypiGYNNieT4XCZzmEtElTARkh21EdP9420zicqHsz3rSwN3p:cIN4X0UzjG8JGGu4SFc2cqMz3rfgm
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-