General
-
Target
4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042
-
Size
13.9MB
-
Sample
231223-terjxaagb4
-
MD5
b8cec37dc02a6177bca0dd4669b1ac69
-
SHA1
7486ad52b8bed2ce4442eb69c730730598e34850
-
SHA256
4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042
-
SHA512
024e9bdff3dbf69c3f27e845af0a07deb5113140bb17a1bfe79dfb932f57d29dc7c2db30e4626f5a0c5044eb1d268d8a67754994fe151fcdf9cf8d5158c7a714
-
SSDEEP
393216:2OG2ENl4aSppIQ4y9QpUHJwIanMDzovysphT:vijS+Q4yrHJwIEizoaUT
Static task
static1
Behavioral task
behavioral1
Sample
4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042
-
Size
13.9MB
-
MD5
b8cec37dc02a6177bca0dd4669b1ac69
-
SHA1
7486ad52b8bed2ce4442eb69c730730598e34850
-
SHA256
4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042
-
SHA512
024e9bdff3dbf69c3f27e845af0a07deb5113140bb17a1bfe79dfb932f57d29dc7c2db30e4626f5a0c5044eb1d268d8a67754994fe151fcdf9cf8d5158c7a714
-
SSDEEP
393216:2OG2ENl4aSppIQ4y9QpUHJwIanMDzovysphT:vijS+Q4yrHJwIEizoaUT
Score7/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
-
-
Target
gdtadv2.jar
-
Size
636KB
-
MD5
cf57d4f9f2ccd86816c4f02989252423
-
SHA1
6978f24478ba9baa004bf4d21db251fe67957ec2
-
SHA256
e6df28c535e661d33a134407674c32555fb985a6a8f3bf8ec743150db61fa7ec
-
SHA512
f759aea4c4fb91ce69f8238bd0e7c0f99b826cad04fc9c5f47c5afde2eceaf71d515d00f0e08b73c169e1a8bd21a17ddd3971bae27ddeb6960daaf5c5d719d4b
-
SSDEEP
12288:lsocNwAPog24tsNbfevYHzN953QZlo5M0f+DMpP7x07S232vjUG:MNvPA9oYHzN953QEM0npDx0nm
Score1/10 -