General
-
Target
9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0
-
Size
6.0MB
-
Sample
231220-le929afchj
-
MD5
1210b9ea71ce85a13b14dd0d60882330
-
SHA1
ff6f1fe491a756fc8ce1ed4305ac013022213996
-
SHA256
9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0
-
SHA512
418cf03685032aee755efb7ac06b0c0b5f58c8a005237c6b6e84c3f3601e054bd394565b5c450896361e27aa9f67f7c954544d4960b33219b8fc2fa2534bf36a
-
SSDEEP
98304:eppBb1scCz4waj08lDbHFHK96kCLa9cIJ5CLKSDdE3s+c7UUmMfoabg+k4g8MnfM:eZacCUwCxlDbQ9zCLOJsLnE3sBLW+k4n
Static task
static1
Behavioral task
behavioral1
Sample
9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0.apk
Behavioral task
behavioral2
Sample
9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Malware Config
Targets
-
-
Target
9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0
-
Size
6.0MB
-
MD5
1210b9ea71ce85a13b14dd0d60882330
-
SHA1
ff6f1fe491a756fc8ce1ed4305ac013022213996
-
SHA256
9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0
-
SHA512
418cf03685032aee755efb7ac06b0c0b5f58c8a005237c6b6e84c3f3601e054bd394565b5c450896361e27aa9f67f7c954544d4960b33219b8fc2fa2534bf36a
-
SSDEEP
98304:eppBb1scCz4waj08lDbHFHK96kCLa9cIJ5CLKSDdE3s+c7UUmMfoabg+k4g8MnfM:eZacCUwCxlDbQ9zCLOJsLnE3sBLW+k4n
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
1.3MB
-
MD5
01f70d1d95d57cd79721b63d136f5b37
-
SHA1
502039e99f6279154bda5aeda798581d717e0eca
-
SHA256
1272f39dcb017f793f517c8d852d64ac666db51bd5f20179a2ac8266861b236f
-
SHA512
d9446ac3905b10cd453a9259eaa0f03de163c59fc160f5164fbc30760b477e61094efe6e0d58b9c39bb6a4e91c640c704766552d2a2722d5e6d7c2ba628bf55a
-
SSDEEP
24576:oM5KOCgm1RjzNxk9hJqp6OVGnhfqsT3XqhjCPwoVA7EtLOjZj401Uk/nd2ZPKbn/:95KF1RvNK9hkohisTn4jCI4fONj40v/R
ScoreN/A -