General
-
Target
21a0120b0b633d67e0337e4710e10697fd27cc6b8dd418503034fc9df8cecc4f
-
Size
18.9MB
-
Sample
231223-qtgfpsbgck
-
MD5
b3663e5d7a1650a0610edf1a74cd2e45
-
SHA1
278ee8988c453a596587ae136da1f1c96d667f2b
-
SHA256
21a0120b0b633d67e0337e4710e10697fd27cc6b8dd418503034fc9df8cecc4f
-
SHA512
7c3a396ccf8a196551eb0431d4036f34cf642944c541c0aacc104c8b7534a165e07581b0608062edfb2852e9e05a24144de48a2e7416ad75dd93a9e458c57c17
-
SSDEEP
393216:zs4ObMivwcGGl5NpDgZ4HWGTmbmrNwVyw8BxQvm:zs4pivwcGA5Nt242GSaBbwm
Static task
static1
Behavioral task
behavioral1
Sample
21a0120b0b633d67e0337e4710e10697fd27cc6b8dd418503034fc9df8cecc4f.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
21a0120b0b633d67e0337e4710e10697fd27cc6b8dd418503034fc9df8cecc4f
-
Size
18.9MB
-
MD5
b3663e5d7a1650a0610edf1a74cd2e45
-
SHA1
278ee8988c453a596587ae136da1f1c96d667f2b
-
SHA256
21a0120b0b633d67e0337e4710e10697fd27cc6b8dd418503034fc9df8cecc4f
-
SHA512
7c3a396ccf8a196551eb0431d4036f34cf642944c541c0aacc104c8b7534a165e07581b0608062edfb2852e9e05a24144de48a2e7416ad75dd93a9e458c57c17
-
SSDEEP
393216:zs4ObMivwcGGl5NpDgZ4HWGTmbmrNwVyw8BxQvm:zs4pivwcGA5Nt242GSaBbwm
Score7/10-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-