General
-
Target
7f700427ff84ffa56e93f71880999a1f
-
Size
28.1MB
-
Sample
231222-kx9c1agah4
-
MD5
7f700427ff84ffa56e93f71880999a1f
-
SHA1
ee3a125cf0323b32449595eba8f95a3a85b9c3c9
-
SHA256
26b746d99b82aa0637b74c4b7afd8b6eed7ef0992418636a6ef3e963702837e1
-
SHA512
c52ceb3a3397717c06e19a0e351fccd089e5b84445203f276bb3ff4a82515dc92b4d1cb8f7a251095ba5ecea5c00c3040ef6b46e1cc438c61590b22c023094ed
-
SSDEEP
786432:x7u8IJG1L8GWllbDfShLHd8t1RheNmIAgv5/oB8l3+sus/AMtgsR:x7u8IJG1LWbjShJg6NThIY3NJ/AMLR
Static task
static1
Behavioral task
behavioral1
Sample
7f700427ff84ffa56e93f71880999a1f.apk
Malware Config
Targets
-
-
Target
7f700427ff84ffa56e93f71880999a1f
-
Size
28.1MB
-
MD5
7f700427ff84ffa56e93f71880999a1f
-
SHA1
ee3a125cf0323b32449595eba8f95a3a85b9c3c9
-
SHA256
26b746d99b82aa0637b74c4b7afd8b6eed7ef0992418636a6ef3e963702837e1
-
SHA512
c52ceb3a3397717c06e19a0e351fccd089e5b84445203f276bb3ff4a82515dc92b4d1cb8f7a251095ba5ecea5c00c3040ef6b46e1cc438c61590b22c023094ed
-
SSDEEP
786432:x7u8IJG1L8GWllbDfShLHd8t1RheNmIAgv5/oB8l3+sus/AMtgsR:x7u8IJG1LWbjShJg6NThIY3NJ/AMLR
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-