General
-
Target
89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b
-
Size
12.3MB
-
Sample
231220-gnj5zaaaa2
-
MD5
cbad052cbb38d362c2934ec764b3fcc2
-
SHA1
8bbd8dd553ed0d49c4d29e09f6a1b55b63f5817e
-
SHA256
89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b
-
SHA512
b7b10b03aa087e20356cb6bd900a61af28dde58ee645bdd23a86dccd3c88858b42bb5e625f962284f166e093cff742e24173d379e02c473db178b333e809cb2a
-
SSDEEP
393216:PyGMEFUV9nk5bz1ho70VgO7I/leC4coGZNlFNRqC:hY9k5X1ho70VgOsL4clXDNRqC
Static task
static1
Behavioral task
behavioral1
Sample
89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b
-
Size
12.3MB
-
MD5
cbad052cbb38d362c2934ec764b3fcc2
-
SHA1
8bbd8dd553ed0d49c4d29e09f6a1b55b63f5817e
-
SHA256
89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b
-
SHA512
b7b10b03aa087e20356cb6bd900a61af28dde58ee645bdd23a86dccd3c88858b42bb5e625f962284f166e093cff742e24173d379e02c473db178b333e809cb2a
-
SSDEEP
393216:PyGMEFUV9nk5bz1ho70VgO7I/leC4coGZNlFNRqC:hY9k5X1ho70VgOsL4clXDNRqC
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-