General
-
Target
824ff409d74b3cd086d4bc171350c3ff5561aa6523c53b744cddc6598ae35582
-
Size
27.5MB
-
Sample
231220-ekvq7abaer
-
MD5
a377f3cc56e859be332ad36ddd5f4578
-
SHA1
27319850991c7899f147ddb77d79f4d3d69d9da0
-
SHA256
824ff409d74b3cd086d4bc171350c3ff5561aa6523c53b744cddc6598ae35582
-
SHA512
648606d8c8bcb036c6b9740aa47a865ee5e8775d42c2fb737ea6912b5c701dda9b2605020cf779647d3843891ef7082d6215534621d148da7b46a5e530c755f2
-
SSDEEP
786432:qwxJvyhvdTNNkcZ9HMbPtcv6um8Xuqw2jaHpXN/lyFo:qwvyrTHQb1ci/8X+2YNlyFo
Static task
static1
Behavioral task
behavioral1
Sample
824ff409d74b3cd086d4bc171350c3ff5561aa6523c53b744cddc6598ae35582.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
824ff409d74b3cd086d4bc171350c3ff5561aa6523c53b744cddc6598ae35582
-
Size
27.5MB
-
MD5
a377f3cc56e859be332ad36ddd5f4578
-
SHA1
27319850991c7899f147ddb77d79f4d3d69d9da0
-
SHA256
824ff409d74b3cd086d4bc171350c3ff5561aa6523c53b744cddc6598ae35582
-
SHA512
648606d8c8bcb036c6b9740aa47a865ee5e8775d42c2fb737ea6912b5c701dda9b2605020cf779647d3843891ef7082d6215534621d148da7b46a5e530c755f2
-
SSDEEP
786432:qwxJvyhvdTNNkcZ9HMbPtcv6um8Xuqw2jaHpXN/lyFo:qwvyrTHQb1ci/8X+2YNlyFo
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-