General
-
Target
78e38bfe00f5508ed547dc10f6237cf18aa9519d130bea765f67aa781bae52fa
-
Size
31.8MB
-
Sample
231220-bv2qpshea9
-
MD5
8261ac84eb6cef90e030fa7ed718c339
-
SHA1
6180148eafbc8c76eb503432ed04a21b8e624991
-
SHA256
78e38bfe00f5508ed547dc10f6237cf18aa9519d130bea765f67aa781bae52fa
-
SHA512
e908491d506401e4b99f9b995c41d8ef41783fe0dd0433ee2791d53b4baa255b8641ceca60ed4a83aa2c5ba62bb0aa5738085992a632f75f408285f301de4d7d
-
SSDEEP
786432:nzrHmVnSxwQWQwUI+L2rEHbYeTdrj3IQfXn+mDvcRs+BRkcu6Afl:nzrGVnasn+L2wkexrjzfXn+mD0RsEkcq
Static task
static1
Behavioral task
behavioral1
Sample
78e38bfe00f5508ed547dc10f6237cf18aa9519d130bea765f67aa781bae52fa.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
78e38bfe00f5508ed547dc10f6237cf18aa9519d130bea765f67aa781bae52fa.apk
Resource
android-33-x64-arm64-20231215-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
78e38bfe00f5508ed547dc10f6237cf18aa9519d130bea765f67aa781bae52fa
-
Size
31.8MB
-
MD5
8261ac84eb6cef90e030fa7ed718c339
-
SHA1
6180148eafbc8c76eb503432ed04a21b8e624991
-
SHA256
78e38bfe00f5508ed547dc10f6237cf18aa9519d130bea765f67aa781bae52fa
-
SHA512
e908491d506401e4b99f9b995c41d8ef41783fe0dd0433ee2791d53b4baa255b8641ceca60ed4a83aa2c5ba62bb0aa5738085992a632f75f408285f301de4d7d
-
SSDEEP
786432:nzrHmVnSxwQWQwUI+L2rEHbYeTdrj3IQfXn+mDvcRs+BRkcu6Afl:nzrGVnasn+L2wkexrjzfXn+mD0RsEkcq
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
1.1MB
-
MD5
252435bef4865cab4f50dc9e651e4848
-
SHA1
0d6a82cad5b6883ce1d952d142fefdc673baf0ee
-
SHA256
7000e6a8f75db9cef620fb13159362ae7027aa6d9adaddacbd9e77ef2b84f98d
-
SHA512
796b3476f45971d3e0b35215d072b2d2c63027f76812c092292295ebd30be6441a37f223bce8f51faccadcf38e299ef1f98d3546b7989645510baa461f214190
-
SSDEEP
24576:HZrPZbONad/a9nZcOWPjywoGpe6LrA1kIb5wCCv1SC5+zCmmtxwQ+bZ:5rBbOcdS9nZcXywoRRtmCSSCkzAC/V
Score1/10 -