General
-
Target
7d4abbe29e55ca2ff81bc0dc0c6651dcc7fcf9eb0e72cba3a4a127f8b075e8df
-
Size
8.6MB
-
Sample
231220-cs71dagcbq
-
MD5
66f093bd4f9269c1cd35904a3f4c8ab3
-
SHA1
368de5a90791962d8bd7ce6b5ddd63e2a37c272f
-
SHA256
7d4abbe29e55ca2ff81bc0dc0c6651dcc7fcf9eb0e72cba3a4a127f8b075e8df
-
SHA512
c59c2eff7c19cdce2d455f4237fa8d41b6c2cf87a0647a1e86135b296d94c259078160173d7939588cb53a5ededa09ec86955c049db4f7a7ac998006c62f0fdb
-
SSDEEP
196608:FA33SI3EZ/hsMw5ZIxvIae0aeRRfVfgsI04zF4:qnnhMw5jwaeRvBI0WF4
Static task
static1
Behavioral task
behavioral1
Sample
7d4abbe29e55ca2ff81bc0dc0c6651dcc7fcf9eb0e72cba3a4a127f8b075e8df.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
7d4abbe29e55ca2ff81bc0dc0c6651dcc7fcf9eb0e72cba3a4a127f8b075e8df
-
Size
8.6MB
-
MD5
66f093bd4f9269c1cd35904a3f4c8ab3
-
SHA1
368de5a90791962d8bd7ce6b5ddd63e2a37c272f
-
SHA256
7d4abbe29e55ca2ff81bc0dc0c6651dcc7fcf9eb0e72cba3a4a127f8b075e8df
-
SHA512
c59c2eff7c19cdce2d455f4237fa8d41b6c2cf87a0647a1e86135b296d94c259078160173d7939588cb53a5ededa09ec86955c049db4f7a7ac998006c62f0fdb
-
SSDEEP
196608:FA33SI3EZ/hsMw5ZIxvIae0aeRRfVfgsI04zF4:qnnhMw5jwaeRvBI0WF4
Score7/10-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests cell location
Uses Android APIs to to get current cell information.
-