General
-
Target
2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33
-
Size
9.6MB
-
Sample
231223-rpd1fsdecn
-
MD5
e8ec71f418d6e189233f19baabbc9fd4
-
SHA1
fd55fec1f5972dac3cc2d0dd50fd2ca87316fc76
-
SHA256
2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33
-
SHA512
f3281fd08490bba4bf446702f1511ee1a5e4e8cf2d45cc4a6c212eaf2932d0ae7302027efa32446e662fe7c5224f21e02817710b7214810061fa63e1b14aed8a
-
SSDEEP
196608:QjDQX6l/1QlY0ellHSb8LiqQyz4Q0IIDukLikMnBTyKiAIsv0:QjDQqh2lTellHSb8LoYILLinnBh/Isv0
Behavioral task
behavioral1
Sample
2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33
-
Size
9.6MB
-
MD5
e8ec71f418d6e189233f19baabbc9fd4
-
SHA1
fd55fec1f5972dac3cc2d0dd50fd2ca87316fc76
-
SHA256
2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33
-
SHA512
f3281fd08490bba4bf446702f1511ee1a5e4e8cf2d45cc4a6c212eaf2932d0ae7302027efa32446e662fe7c5224f21e02817710b7214810061fa63e1b14aed8a
-
SSDEEP
196608:QjDQX6l/1QlY0ellHSb8LiqQyz4Q0IIDukLikMnBTyKiAIsv0:QjDQqh2lTellHSb8LoYILLinnBh/Isv0
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-