General
-
Target
3f94884db79afad2b84d96263db503c364c2c435d8ae9ba29692da67a82ac9b9
-
Size
2.9MB
-
Sample
231223-s17btaaac6
-
MD5
f03f9744840b7fb173fe583113cd40cb
-
SHA1
12d289fff5bc91d43b6faff6729313a066773fb2
-
SHA256
3f94884db79afad2b84d96263db503c364c2c435d8ae9ba29692da67a82ac9b9
-
SHA512
26edb402e6dbd6f6a7d08d43db35f74c1402df4e8a46ca5f1b9ac579af91f08a136d1796cfc0cf0c03e69108dc88be905f7627f1bae8f4d5c405f9d728c404d8
-
SSDEEP
49152:TZRC65+2I/qCdu9UxpCNEPXWzEzDGvFjwmt/5h1sFJLUKEFl5Qo3Gm:TZc60T/5dD0NJmDGvNt/5hOFJnil5P2m
Static task
static1
Behavioral task
behavioral1
Sample
3f94884db79afad2b84d96263db503c364c2c435d8ae9ba29692da67a82ac9b9.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
3f94884db79afad2b84d96263db503c364c2c435d8ae9ba29692da67a82ac9b9
-
Size
2.9MB
-
MD5
f03f9744840b7fb173fe583113cd40cb
-
SHA1
12d289fff5bc91d43b6faff6729313a066773fb2
-
SHA256
3f94884db79afad2b84d96263db503c364c2c435d8ae9ba29692da67a82ac9b9
-
SHA512
26edb402e6dbd6f6a7d08d43db35f74c1402df4e8a46ca5f1b9ac579af91f08a136d1796cfc0cf0c03e69108dc88be905f7627f1bae8f4d5c405f9d728c404d8
-
SSDEEP
49152:TZRC65+2I/qCdu9UxpCNEPXWzEzDGvFjwmt/5h1sFJLUKEFl5Qo3Gm:TZc60T/5dD0NJmDGvNt/5hOFJnil5P2m
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-