General
-
Target
344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47
-
Size
9.5MB
-
Sample
231223-r5p3naecgm
-
MD5
653b1e0bbfef45cc50deaa7038dd33a6
-
SHA1
1291641f9b2ac5d27ab4f753b7a491674a0a0bed
-
SHA256
344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47
-
SHA512
f0ba0e4bff6f00313c502892963da338a50727506e99d7060a30b57fdd03a92d76d12e0171b44e3fec39d0accf3fa0d77938e8aebf345ce67f9f28c56c6b0de8
-
SSDEEP
196608:smnMsXrXE+bBcQY5zNU3pAeQwM55B+VWvRdqdzRjgNdhiU1rrsOMgXj9:smnMsbXitNU3pAeQwW5BPMCNdhtrsXu
Behavioral task
behavioral1
Sample
344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47
-
Size
9.5MB
-
MD5
653b1e0bbfef45cc50deaa7038dd33a6
-
SHA1
1291641f9b2ac5d27ab4f753b7a491674a0a0bed
-
SHA256
344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47
-
SHA512
f0ba0e4bff6f00313c502892963da338a50727506e99d7060a30b57fdd03a92d76d12e0171b44e3fec39d0accf3fa0d77938e8aebf345ce67f9f28c56c6b0de8
-
SSDEEP
196608:smnMsXrXE+bBcQY5zNU3pAeQwM55B+VWvRdqdzRjgNdhiU1rrsOMgXj9:smnMsbXitNU3pAeQwW5BPMCNdhtrsXu
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-