General
-
Target
96dbe56beca93d3faed3191ccbe264151272de1a92a7a8c0e46482c92aaa1179
-
Size
6.7MB
-
Sample
231220-kkcs9sfgf6
-
MD5
734e3fde1dc9b6cf195abff127f13bd8
-
SHA1
de4e6024b56e01e397a6c68bf9ca83c31dee3924
-
SHA256
96dbe56beca93d3faed3191ccbe264151272de1a92a7a8c0e46482c92aaa1179
-
SHA512
c1560bb49f703638fa96994d22077ea9ce9a85c9c1f0036d6335ca016110eed390ab35ef5818b72777e2d0280ed4bbedb600eadcaebc40426061a677967e3541
-
SSDEEP
196608:W9BZESfl0u+kLJlE5HSSQu0bC5GMCTz7TZSE:0Z4kLJlErI6eT3L
Static task
static1
Behavioral task
behavioral1
Sample
96dbe56beca93d3faed3191ccbe264151272de1a92a7a8c0e46482c92aaa1179.apk
Behavioral task
behavioral2
Sample
96dbe56beca93d3faed3191ccbe264151272de1a92a7a8c0e46482c92aaa1179.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral3
Sample
dmss_v2.apk
Behavioral task
behavioral4
Sample
dmss_v2.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral5
Sample
dmss_v2.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral6
Sample
dump.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral7
Sample
dump.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral8
Sample
dump.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral9
Sample
dynamic.apk
Behavioral task
behavioral10
Sample
dynamic.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral11
Sample
dynamic.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
96dbe56beca93d3faed3191ccbe264151272de1a92a7a8c0e46482c92aaa1179
-
Size
6.7MB
-
MD5
734e3fde1dc9b6cf195abff127f13bd8
-
SHA1
de4e6024b56e01e397a6c68bf9ca83c31dee3924
-
SHA256
96dbe56beca93d3faed3191ccbe264151272de1a92a7a8c0e46482c92aaa1179
-
SHA512
c1560bb49f703638fa96994d22077ea9ce9a85c9c1f0036d6335ca016110eed390ab35ef5818b72777e2d0280ed4bbedb600eadcaebc40426061a677967e3541
-
SSDEEP
196608:W9BZESfl0u+kLJlE5HSSQu0bC5GMCTz7TZSE:0Z4kLJlErI6eT3L
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
-
-
Target
dmss_v2.jar
-
Size
126KB
-
MD5
aa64c54de3204df266353f78f8f92743
-
SHA1
f30391c3c576f3ad05cae309d4b3ed63759f140f
-
SHA256
a9d07897e42c42c15f27ac1e3a907072bce90aeed7cf70ad3c52ea020a2bb1ac
-
SHA512
a3be909d084d88dc1da4c0b0fd8dfbcc63d3149308f622b094fb1b9b4a47c2e5fe9633fd7354e2ce281d222fffcfdfd3896708cb398c81f12437aa8f0720690c
-
SSDEEP
3072:QWDEMmwiLvzgsHGEIqTriwmelZLoALvFchukchKC+8G/ee:pDpmwiJ2Ur7mhAL+kkcPG1
Score1/10 -
-
-
Target
dump.jar
-
Size
68KB
-
MD5
fc86a61adb9f6c52f49836de04159cad
-
SHA1
ce20ad7819f749db65e64df912e62fc95179c2de
-
SHA256
39df03d741bb3e13392fd0c8c39fbbe903aca84b72cf1c04644ef81b13363265
-
SHA512
7e44d71baa4cf9db1e805ce17b37b45f9621890aefce5ee5cc5c5e6e94e6cfd144ef1221e475e066b1fe3445f45982d56a107ad6fd65c2dfb6427b680d16b355
-
SSDEEP
1536:rAbwGcYLL4MTeEhnlIKDCMzThhqzjUSykxl5R:aFf1JlIKfQU/AjR
Score1/10 -
-
-
Target
dynamic.jar
-
Size
77KB
-
MD5
c14c8a2f5d3a7c47eb2ca8c1b6e69adb
-
SHA1
4e57b3c0f34427aba8a5be40c2e9b627172a89c8
-
SHA256
7d7ada76ea057847b5c47ed0f16a6d0e52cdbebbbdb08c1a9519acf70a1a4107
-
SHA512
2be420b849c0fa84d3c594ab6bc85255eb54915e05aac5fd3d711e8dc93f484c5a2add2c662a858d4c2ce316a716c9e930122e9cb1047be7482c495242d766e4
-
SSDEEP
1536:fLAphepUaQbf6B7Xpy0lL8laR5pSbz1yBjwUP6SrL4z:cuXYm7XpywIoSb8scFL4z
Score1/10 -