General
-
Target
a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c
-
Size
13.6MB
-
Sample
231220-nacx3afhe6
-
MD5
123f0c75a007faac87f197c210ae15df
-
SHA1
152ea8dabd7ef13fc1e65e86abac20b4fcb7bc09
-
SHA256
a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c
-
SHA512
7183b23b20d8f8416580593b9664db5ffb0f87fb909ada0dc458b9cb5ab41d6da5cbed5361d615ca2b031969929ef66c2b233ab35226d50e7d108225315b01e7
-
SSDEEP
393216:Txee8Of1VR9GHeNfoTbpBQnrpT7RB2ymNEHw3g8q:1JFN3QNpBMXwyAEhL
Static task
static1
Behavioral task
behavioral1
Sample
a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c.apk
Behavioral task
behavioral2
Sample
a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c
-
Size
13.6MB
-
MD5
123f0c75a007faac87f197c210ae15df
-
SHA1
152ea8dabd7ef13fc1e65e86abac20b4fcb7bc09
-
SHA256
a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c
-
SHA512
7183b23b20d8f8416580593b9664db5ffb0f87fb909ada0dc458b9cb5ab41d6da5cbed5361d615ca2b031969929ef66c2b233ab35226d50e7d108225315b01e7
-
SSDEEP
393216:Txee8Of1VR9GHeNfoTbpBQnrpT7RB2ymNEHw3g8q:1JFN3QNpBMXwyAEhL
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-