General
-
Target
311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59
-
Size
9.8MB
-
Sample
231223-rww5lsgca4
-
MD5
4892a230279c47c8c3f8503234110117
-
SHA1
62e75c4949fdb1aaea145b39e4b75f89c0a4c452
-
SHA256
311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59
-
SHA512
e00e48b32eb6fdc6d78755221411d45c94f39969f939fee8c56f17ee8dfc44b4384c82e043f61c6191badc0d8ab368b1210180efb090af38b2027dff2579e19f
-
SSDEEP
196608:+KLV20Bn81eD/zqBNIl2RfzDU3pAeSqSjOY7kT0C5F0dhiU1rrsOMgXjW:+K40qoDrqBNIl+bDU3pAe1IO+kT0kSdO
Behavioral task
behavioral1
Sample
311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59
-
Size
9.8MB
-
MD5
4892a230279c47c8c3f8503234110117
-
SHA1
62e75c4949fdb1aaea145b39e4b75f89c0a4c452
-
SHA256
311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59
-
SHA512
e00e48b32eb6fdc6d78755221411d45c94f39969f939fee8c56f17ee8dfc44b4384c82e043f61c6191badc0d8ab368b1210180efb090af38b2027dff2579e19f
-
SSDEEP
196608:+KLV20Bn81eD/zqBNIl2RfzDU3pAeSqSjOY7kT0C5F0dhiU1rrsOMgXjW:+K40qoDrqBNIl+bDU3pAe1IO+kT0kSdO
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-