General
-
Target
3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1
-
Size
15.6MB
-
Sample
231223-sh8f6ahcf3
-
MD5
c4f68006ee772cc2b14b49e8916d7efc
-
SHA1
d4580d48834f5be46fb1991fb89bb250e8a273d5
-
SHA256
3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1
-
SHA512
8d123465c19d6f4bc2e08af89436ffa581576be6e2b593c0681ccab582df5901a33500c7d17b447332012fd3b76ed78fda0bd01837cb90880168c89e4ad9da13
-
SSDEEP
393216:+AEzLOfO+JC44LRp4SwoSiJQnZBevvUmuD:+mftSLRpXkiGZ6qD
Static task
static1
Behavioral task
behavioral1
Sample
3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1
-
Size
15.6MB
-
MD5
c4f68006ee772cc2b14b49e8916d7efc
-
SHA1
d4580d48834f5be46fb1991fb89bb250e8a273d5
-
SHA256
3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1
-
SHA512
8d123465c19d6f4bc2e08af89436ffa581576be6e2b593c0681ccab582df5901a33500c7d17b447332012fd3b76ed78fda0bd01837cb90880168c89e4ad9da13
-
SSDEEP
393216:+AEzLOfO+JC44LRp4SwoSiJQnZBevvUmuD:+mftSLRpXkiGZ6qD
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-