General
-
Target
a0449b6e7f5100d19372c3de21c17185e623e0c508d9c3cdfb2670c0cbc021cd
-
Size
10.5MB
-
Sample
231223-3fk8yscha9
-
MD5
d8e9acf545bc9a64a691716bb3890ca3
-
SHA1
bf98b6e34bfd24041479994988ed46b93747d4e8
-
SHA256
a0449b6e7f5100d19372c3de21c17185e623e0c508d9c3cdfb2670c0cbc021cd
-
SHA512
c75fc4b0669d74a93ed77f204a65687d1eab42f244787d689ad0d8bfbf3c9eba3a5358a08934a2e96eeb16ab1ddba1f9ac5d25580e804487df63000443ccb7e3
-
SSDEEP
196608:dBCH/5G2/5k5RLk68CS21RTE5WA3+WPvmE5UJINc2coiiCieRdN4jEGyQax:LCHp/5WRk6NS55W/WPvdaINc2jiOeRme
Static task
static1
Behavioral task
behavioral1
Sample
a0449b6e7f5100d19372c3de21c17185e623e0c508d9c3cdfb2670c0cbc021cd.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
bdxadsdk.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral3
Sample
bdxadsdk.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral4
Sample
bdxadsdk.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral5
Sample
gdtadv2.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral6
Sample
gdtadv2.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral7
Sample
gdtadv2.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
a0449b6e7f5100d19372c3de21c17185e623e0c508d9c3cdfb2670c0cbc021cd
-
Size
10.5MB
-
MD5
d8e9acf545bc9a64a691716bb3890ca3
-
SHA1
bf98b6e34bfd24041479994988ed46b93747d4e8
-
SHA256
a0449b6e7f5100d19372c3de21c17185e623e0c508d9c3cdfb2670c0cbc021cd
-
SHA512
c75fc4b0669d74a93ed77f204a65687d1eab42f244787d689ad0d8bfbf3c9eba3a5358a08934a2e96eeb16ab1ddba1f9ac5d25580e804487df63000443ccb7e3
-
SSDEEP
196608:dBCH/5G2/5k5RLk68CS21RTE5WA3+WPvmE5UJINc2coiiCieRdN4jEGyQax:LCHp/5WRk6NS55W/WPvdaINc2jiOeRme
Score7/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
bdxadsdk.jar
-
Size
85KB
-
MD5
3c850ffec5bdd850f123077ca210a411
-
SHA1
1c1ae4678b8a3b65640f047cb1bd72bc70d66f97
-
SHA256
516023ce55fff40074d3c3d9016c023b1fc7dfba2b59c172f89141f1484d418e
-
SHA512
aa3611687b6140ee9214392a84bc1ef55a6425a84a4e413dfcb2e936a931b9015e1e4ec53ad73539d26622427f9e6da0eae5c58ffc18285de42fc15639d786dd
-
SSDEEP
1536:E4A1vm52J1h/mgxeek9/Ckkf1THL8BNbM/DXO8Q/3yJ463v6hHA0UGcVrSj:e9mkJ1tmg/I/tkdP8sa80O42uXcVrE
Score1/10 -
-
-
Target
gdtadv2.jar
-
Size
230KB
-
MD5
39b3b45493a73ac914e00aebc4831040
-
SHA1
5f435afd5652a34559cad3495aa0274b69bed763
-
SHA256
9d78a9c9350130f8a57618278172bf07d302e1c373691b604133138d853af527
-
SHA512
3ab8844120bdaf14f6f75b1ea199a6e5cf182f18e7b4e08ae0517a6f70bce09fc855f15463280111b3992b6f65a8743e031064b3185aa00e62eefed2a9e5e0de
-
SSDEEP
6144:8z7P+KAFiHKCac3IRT1xgD0QWZyEcwlAObvZ:8zKKMiHKCac32Tz40PHVp1
Score1/10 -