General
-
Target
a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d
-
Size
12.3MB
-
Sample
231220-l82yqshbgm
-
MD5
7d9f983a7b498051ab7a0cf3949c809e
-
SHA1
0788293729e768267882e84ff6363ca324ad1f63
-
SHA256
a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d
-
SHA512
f7577c1020fe5c820e476babc88f0697d95850b42392c74739d1a02b9b11738f8c6e8b5d811e738253f252465b2f7fa5e8511f8c346755568bf82cd3ae6958d7
-
SSDEEP
196608:0MGhO6IyCEztc02T1gQjfboAD9/434QkFyUyzaRRgytWlvrN9E/Ns:9GNc08hjbzJw3zPzoiy094/y
Static task
static1
Behavioral task
behavioral1
Sample
a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d.apk
Behavioral task
behavioral2
Sample
a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Malware Config
Targets
-
-
Target
a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d
-
Size
12.3MB
-
MD5
7d9f983a7b498051ab7a0cf3949c809e
-
SHA1
0788293729e768267882e84ff6363ca324ad1f63
-
SHA256
a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d
-
SHA512
f7577c1020fe5c820e476babc88f0697d95850b42392c74739d1a02b9b11738f8c6e8b5d811e738253f252465b2f7fa5e8511f8c346755568bf82cd3ae6958d7
-
SSDEEP
196608:0MGhO6IyCEztc02T1gQjfboAD9/434QkFyUyzaRRgytWlvrN9E/Ns:9GNc08hjbzJw3zPzoiy094/y
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
636KB
-
MD5
cf57d4f9f2ccd86816c4f02989252423
-
SHA1
6978f24478ba9baa004bf4d21db251fe67957ec2
-
SHA256
e6df28c535e661d33a134407674c32555fb985a6a8f3bf8ec743150db61fa7ec
-
SHA512
f759aea4c4fb91ce69f8238bd0e7c0f99b826cad04fc9c5f47c5afde2eceaf71d515d00f0e08b73c169e1a8bd21a17ddd3971bae27ddeb6960daaf5c5d719d4b
-
SSDEEP
12288:lsocNwAPog24tsNbfevYHzN953QZlo5M0f+DMpP7x07S232vjUG:MNvPA9oYHzN953QEM0npDx0nm
ScoreN/A -