General
-
Target
147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc
-
Size
30.2MB
-
Sample
231223-pv285ahghp
-
MD5
3ee34bb1560320bfdb2f12fc581e2ada
-
SHA1
f91d6f7512650129fa0751143a4a631c7de06a2e
-
SHA256
147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc
-
SHA512
b7158da7f32286ac754bbc76e982d5263b6cdcfed65adf8610ea988d058d412c4ca53c953b27f1d3f94e35ca0df589e37760f2398504f73dc4149ba42ac3a75b
-
SSDEEP
786432:x9ZbNTA4jWmfrGOfPkCXbUmCuB803Q2i+/qPwu8i:x9ZbNT5jDdJbRW891SPhP
Static task
static1
Behavioral task
behavioral1
Sample
147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc.apk
Behavioral task
behavioral2
Sample
147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc
-
Size
30.2MB
-
MD5
3ee34bb1560320bfdb2f12fc581e2ada
-
SHA1
f91d6f7512650129fa0751143a4a631c7de06a2e
-
SHA256
147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc
-
SHA512
b7158da7f32286ac754bbc76e982d5263b6cdcfed65adf8610ea988d058d412c4ca53c953b27f1d3f94e35ca0df589e37760f2398504f73dc4149ba42ac3a75b
-
SSDEEP
786432:x9ZbNTA4jWmfrGOfPkCXbUmCuB803Q2i+/qPwu8i:x9ZbNT5jDdJbRW891SPhP
Score8/10-
Requests cell location
Uses Android APIs to to get current cell information.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-