General
-
Target
10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac
-
Size
14.2MB
-
Sample
231223-pk4n7shcgl
-
MD5
810e14e6d19e10b54a4c414ff837ba45
-
SHA1
676f36afdf0860dbdff7a3c456947ef83fdbf8b8
-
SHA256
10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac
-
SHA512
4f205a40cc6044730d1573bef9921f6a96270dcc9e04dd8c7629486c005bf5ac2314229ce073b3e09e1b3b982d7b785128fe833998a864d32216608b333e502f
-
SSDEEP
393216:PBgNE1c/Ms2WXHF+hzhBiQ1xKy+Og+Ov9bi4xb2I5X:PBgNE1m9BIzviaxwVvRlnX
Static task
static1
Behavioral task
behavioral1
Sample
10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac.apk
Behavioral task
behavioral2
Sample
10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac.apk
Resource
android-x64-20231215-en
Malware Config
Targets
-
-
Target
10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac
-
Size
14.2MB
-
MD5
810e14e6d19e10b54a4c414ff837ba45
-
SHA1
676f36afdf0860dbdff7a3c456947ef83fdbf8b8
-
SHA256
10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac
-
SHA512
4f205a40cc6044730d1573bef9921f6a96270dcc9e04dd8c7629486c005bf5ac2314229ce073b3e09e1b3b982d7b785128fe833998a864d32216608b333e502f
-
SSDEEP
393216:PBgNE1c/Ms2WXHF+hzhBiQ1xKy+Og+Ov9bi4xb2I5X:PBgNE1m9BIzviaxwVvRlnX
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads device software version
Uses Android APIs to read software version number for the device (IMEI/SV for GSM devices).
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-