General
-
Target
872d6f98c87cc9f9c7a447db24828ea9e00fc67d9eaa60cac45695f575c0e734
-
Size
20.5MB
-
Sample
231220-f3d2tsdean
-
MD5
228194ec93d0130e26bb18d34dadfd46
-
SHA1
9b14f15412fdc3a7b370d07fdbb0ddb132cab4ba
-
SHA256
872d6f98c87cc9f9c7a447db24828ea9e00fc67d9eaa60cac45695f575c0e734
-
SHA512
8050a23a47c87fae5fda7dd379e81a35742c00bb55bf221744a47674b6630ffcfcb4617968fda0c231683c3a4da0bcb96ba55c60dd65f68abbc8cab18f9caf11
-
SSDEEP
393216:FmLO2sJA35z7A79L++0r1mbgafiubcLZXbfT9i/zVN2I+TXq1kKpPbNiRSKcsjJ4:owJA35z7c58BmbBffcVX9i/zVN2IkaOk
Static task
static1
Behavioral task
behavioral1
Sample
872d6f98c87cc9f9c7a447db24828ea9e00fc67d9eaa60cac45695f575c0e734.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
872d6f98c87cc9f9c7a447db24828ea9e00fc67d9eaa60cac45695f575c0e734
-
Size
20.5MB
-
MD5
228194ec93d0130e26bb18d34dadfd46
-
SHA1
9b14f15412fdc3a7b370d07fdbb0ddb132cab4ba
-
SHA256
872d6f98c87cc9f9c7a447db24828ea9e00fc67d9eaa60cac45695f575c0e734
-
SHA512
8050a23a47c87fae5fda7dd379e81a35742c00bb55bf221744a47674b6630ffcfcb4617968fda0c231683c3a4da0bcb96ba55c60dd65f68abbc8cab18f9caf11
-
SSDEEP
393216:FmLO2sJA35z7A79L++0r1mbgafiubcLZXbfT9i/zVN2I+TXq1kKpPbNiRSKcsjJ4:owJA35z7c58BmbBffcVX9i/zVN2IkaOk
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests dangerous framework permissions
-