General
-
Target
462604d1a1758a31fca11665d4e5570305400bef432e01516c47ced8753c8c9e
-
Size
28.3MB
-
Sample
231223-tl12xsgfhm
-
MD5
2baae2962e8283316df6c96099bb2595
-
SHA1
527273e8a9ec58ed4f16e86a0af6ae7c08e3a190
-
SHA256
462604d1a1758a31fca11665d4e5570305400bef432e01516c47ced8753c8c9e
-
SHA512
6dc35793ff29e6dda27424966292f01a1aed845de3132d20362a4b15085c795d041a05961b8fa9a5d94aa4cbce3e050efe86cb9cdd42ae3ec2a9066978697752
-
SSDEEP
786432:+8i3tXCM4BwIzD4usIBDl+PTTUcfIp5TPRSWAwp35Gr:ri3tXCMMw44u9BD0TdfaRRgwp54
Static task
static1
Behavioral task
behavioral1
Sample
462604d1a1758a31fca11665d4e5570305400bef432e01516c47ced8753c8c9e.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
462604d1a1758a31fca11665d4e5570305400bef432e01516c47ced8753c8c9e.apk
Resource
android-x64-20231215-en
Malware Config
Targets
-
-
Target
462604d1a1758a31fca11665d4e5570305400bef432e01516c47ced8753c8c9e
-
Size
28.3MB
-
MD5
2baae2962e8283316df6c96099bb2595
-
SHA1
527273e8a9ec58ed4f16e86a0af6ae7c08e3a190
-
SHA256
462604d1a1758a31fca11665d4e5570305400bef432e01516c47ced8753c8c9e
-
SHA512
6dc35793ff29e6dda27424966292f01a1aed845de3132d20362a4b15085c795d041a05961b8fa9a5d94aa4cbce3e050efe86cb9cdd42ae3ec2a9066978697752
-
SSDEEP
786432:+8i3tXCM4BwIzD4usIBDl+PTTUcfIp5TPRSWAwp35Gr:ri3tXCMMw44u9BD0TdfaRRgwp54
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-