General
-
Target
91d44f2f0fb11dc93a06f1a9c085d0d03d8e6dd45e463297a4a032ff544f2218
-
Size
28.2MB
-
Sample
231220-jva7raaedq
-
MD5
1847a72a3d66c637f4820268d85106bf
-
SHA1
0c45e7d8f29fc27a376dbb439739fdf4e44646d1
-
SHA256
91d44f2f0fb11dc93a06f1a9c085d0d03d8e6dd45e463297a4a032ff544f2218
-
SHA512
1e5fab9cc8836b029f49f1af1ea8115e8df52b43ca8dc271defea929d0dee8fd7ee9458f8b3ebbb86024c60eb0633e12072fcf84c56599d9c5a6db196d72460f
-
SSDEEP
786432:kfwnAx3gtWgULzhdrAddfmxY2G9hlEri8bmUvzS/WRHcW:kfwa3Y49eddfmyfWriULR8W
Static task
static1
Malware Config
Targets
-
-
Target
91d44f2f0fb11dc93a06f1a9c085d0d03d8e6dd45e463297a4a032ff544f2218
-
Size
28.2MB
-
MD5
1847a72a3d66c637f4820268d85106bf
-
SHA1
0c45e7d8f29fc27a376dbb439739fdf4e44646d1
-
SHA256
91d44f2f0fb11dc93a06f1a9c085d0d03d8e6dd45e463297a4a032ff544f2218
-
SHA512
1e5fab9cc8836b029f49f1af1ea8115e8df52b43ca8dc271defea929d0dee8fd7ee9458f8b3ebbb86024c60eb0633e12072fcf84c56599d9c5a6db196d72460f
-
SSDEEP
786432:kfwnAx3gtWgULzhdrAddfmxY2G9hlEri8bmUvzS/WRHcW:kfwa3Y49eddfmyfWriULR8W
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-