General
-
Target
03bbf2e181cd1c8a42e118cc3b0cb1ff988bc2371a39483c882ff686cb2a6f84
-
Size
25.7MB
-
Sample
231223-nmktfahhc7
-
MD5
a63c5e76d1a76cf646ea35572dd2234c
-
SHA1
5aa55d460330d4c84e2841be2c836e823687386a
-
SHA256
03bbf2e181cd1c8a42e118cc3b0cb1ff988bc2371a39483c882ff686cb2a6f84
-
SHA512
475bf1f919a11ebb67db97aab9c4b567777e04b6da933ba9e4b8efa400fd31a3ee57cba7f64108c1c2991ccaef52779c9f3edf3ddeee7b557a1be290f270d87d
-
SSDEEP
393216:ZrDcjW4y7YK55DoiX3VmAD8Buv+obsVEC21akrgFECTX3H5j9yskUqVHuFrGmEGR:ZEjbi56YtL91akrODX5jks4QYmV
Static task
static1
Behavioral task
behavioral1
Sample
03bbf2e181cd1c8a42e118cc3b0cb1ff988bc2371a39483c882ff686cb2a6f84.apk
Malware Config
Targets
-
-
Target
03bbf2e181cd1c8a42e118cc3b0cb1ff988bc2371a39483c882ff686cb2a6f84
-
Size
25.7MB
-
MD5
a63c5e76d1a76cf646ea35572dd2234c
-
SHA1
5aa55d460330d4c84e2841be2c836e823687386a
-
SHA256
03bbf2e181cd1c8a42e118cc3b0cb1ff988bc2371a39483c882ff686cb2a6f84
-
SHA512
475bf1f919a11ebb67db97aab9c4b567777e04b6da933ba9e4b8efa400fd31a3ee57cba7f64108c1c2991ccaef52779c9f3edf3ddeee7b557a1be290f270d87d
-
SSDEEP
393216:ZrDcjW4y7YK55DoiX3VmAD8Buv+obsVEC21akrgFECTX3H5j9yskUqVHuFrGmEGR:ZEjbi56YtL91akrODX5jks4QYmV
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-