General
-
Target
46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a
-
Size
14.5MB
-
Sample
231223-tpq15agghp
-
MD5
23c81a9e403eee3421cd19e9fdec3a6b
-
SHA1
087687f936a99f4f2965bf59a1df076807d0ec08
-
SHA256
46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a
-
SHA512
5c02b61899e06775e9d5131c373ec9246ea112f6faec568d866ea4261c7469a36b90aef7184bb78ce9b3ddb8f112cc4e004e419c94d837e42b0c9824fdf0a1c6
-
SSDEEP
196608:l8tpNrIxRoOeJVrDiryGzS+u5sRNz6k46Zd/Q8qQc2Ple7h0AeUxotyjhzQ74JLE:0KeDivUet/QQc2NAOXUxayF8742cL+d
Static task
static1
Behavioral task
behavioral1
Sample
46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a
-
Size
14.5MB
-
MD5
23c81a9e403eee3421cd19e9fdec3a6b
-
SHA1
087687f936a99f4f2965bf59a1df076807d0ec08
-
SHA256
46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a
-
SHA512
5c02b61899e06775e9d5131c373ec9246ea112f6faec568d866ea4261c7469a36b90aef7184bb78ce9b3ddb8f112cc4e004e419c94d837e42b0c9824fdf0a1c6
-
SSDEEP
196608:l8tpNrIxRoOeJVrDiryGzS+u5sRNz6k46Zd/Q8qQc2Ple7h0AeUxotyjhzQ74JLE:0KeDivUet/QQc2NAOXUxayF8742cL+d
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests cell location
Uses Android APIs to to get current cell information.
-