General
-
Target
94b904e4676f04ee341b0516c19b05f88c63b6dd66eb942ab5043307f03199e8
-
Size
176KB
-
Sample
231220-kahxjabggj
-
MD5
49081eea4db8a7334e388846c589a9ae
-
SHA1
eed9fbb5907846d6605addd001953fb3a7f37783
-
SHA256
94b904e4676f04ee341b0516c19b05f88c63b6dd66eb942ab5043307f03199e8
-
SHA512
5e92aea8d7e3f02bf84104ea5b05e6d68d07a37cea4e1b6f7818120a1b3bfda650c8a2af70c07a8f2ec735de06422278a2d9cc6877bf29217d8bdeffb5514cfa
-
SSDEEP
3072:XvEukN4700pr75onSW9zUck0GZSlZTsIvRIEp9F6q5PQgy2nJpQuTqYbc:XMLW70g75o/0IBF6SY54qYbc
Static task
static1
Behavioral task
behavioral1
Sample
94b904e4676f04ee341b0516c19b05f88c63b6dd66eb942ab5043307f03199e8.apk
Behavioral task
behavioral2
Sample
94b904e4676f04ee341b0516c19b05f88c63b6dd66eb942ab5043307f03199e8.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
94b904e4676f04ee341b0516c19b05f88c63b6dd66eb942ab5043307f03199e8.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
94b904e4676f04ee341b0516c19b05f88c63b6dd66eb942ab5043307f03199e8
-
Size
176KB
-
MD5
49081eea4db8a7334e388846c589a9ae
-
SHA1
eed9fbb5907846d6605addd001953fb3a7f37783
-
SHA256
94b904e4676f04ee341b0516c19b05f88c63b6dd66eb942ab5043307f03199e8
-
SHA512
5e92aea8d7e3f02bf84104ea5b05e6d68d07a37cea4e1b6f7818120a1b3bfda650c8a2af70c07a8f2ec735de06422278a2d9cc6877bf29217d8bdeffb5514cfa
-
SSDEEP
3072:XvEukN4700pr75onSW9zUck0GZSlZTsIvRIEp9F6q5PQgy2nJpQuTqYbc:XMLW70g75o/0IBF6SY54qYbc
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-