General
-
Target
8a603a855edb3473e8e0d95b5ee1b90122575550bb41311dd654154d31ea8c16
-
Size
13.1MB
-
Sample
231220-gxprtafahn
-
MD5
b9cc2cedfd280b2c1b0ea2a379f2f64b
-
SHA1
170b4f824875dac8d313bb9f61696e3c5992f259
-
SHA256
8a603a855edb3473e8e0d95b5ee1b90122575550bb41311dd654154d31ea8c16
-
SHA512
81d6b79f54933688b7786c94f86b636c85ea73944bbe9dc6627372d24b5b462e579c2e5358a18cdfb32f4070fb4e574d758541e53a3cde787bca010e4748472b
-
SSDEEP
393216:pvA0B1L5o1iCnhMPgWORXw82KqlPk3BMsswtnj:pv/B1L5o1hhMkhw8Vqler
Static task
static1
Behavioral task
behavioral1
Sample
8a603a855edb3473e8e0d95b5ee1b90122575550bb41311dd654154d31ea8c16.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8a603a855edb3473e8e0d95b5ee1b90122575550bb41311dd654154d31ea8c16.apk
Resource
android-x64-20231215-en
Malware Config
Targets
-
-
Target
8a603a855edb3473e8e0d95b5ee1b90122575550bb41311dd654154d31ea8c16
-
Size
13.1MB
-
MD5
b9cc2cedfd280b2c1b0ea2a379f2f64b
-
SHA1
170b4f824875dac8d313bb9f61696e3c5992f259
-
SHA256
8a603a855edb3473e8e0d95b5ee1b90122575550bb41311dd654154d31ea8c16
-
SHA512
81d6b79f54933688b7786c94f86b636c85ea73944bbe9dc6627372d24b5b462e579c2e5358a18cdfb32f4070fb4e574d758541e53a3cde787bca010e4748472b
-
SSDEEP
393216:pvA0B1L5o1iCnhMPgWORXw82KqlPk3BMsswtnj:pv/B1L5o1hhMkhw8Vqler
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-