General
-
Target
4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2
-
Size
21.9MB
-
Sample
231223-t9avmscba3
-
MD5
593a381742469239a037e2ef1fff7e5e
-
SHA1
97a0019458aebb5a113f00b2e5e4ebf88df07fd1
-
SHA256
4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2
-
SHA512
0b69eb21b5a7efa9762e0938fcf58e32489263304dae564df20591a6b03ce667e1f3c71be7605a5cf66669681f45502c79d11d522c740faa8ca9020e99cc94e3
-
SSDEEP
393216:yrEdxAMu1m9WDpuGzmlfyBlUR3o13X8DgRrOHBOwxcY5H/e4shut6/CToiBwDheC:M9m9Rimlf4lJ13XUe6Zc1bFqTt9C
Static task
static1
Behavioral task
behavioral1
Sample
4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2
-
Size
21.9MB
-
MD5
593a381742469239a037e2ef1fff7e5e
-
SHA1
97a0019458aebb5a113f00b2e5e4ebf88df07fd1
-
SHA256
4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2
-
SHA512
0b69eb21b5a7efa9762e0938fcf58e32489263304dae564df20591a6b03ce667e1f3c71be7605a5cf66669681f45502c79d11d522c740faa8ca9020e99cc94e3
-
SSDEEP
393216:yrEdxAMu1m9WDpuGzmlfyBlUR3o13X8DgRrOHBOwxcY5H/e4shut6/CToiBwDheC:M9m9Rimlf4lJ13XUe6Zc1bFqTt9C
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-