General
-
Target
48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3
-
Size
22.9MB
-
Sample
231223-twdpdahbbk
-
MD5
4427c73ab06ca8e263443d1688ee6d87
-
SHA1
bb6ff23b7576161b4e3160dd9e0ea379a224cfca
-
SHA256
48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3
-
SHA512
55bf393a9b8f0e200eac86b8702c1ad186111be0b4a1156e5d4e65a44b6802be17324c43908d1b315dd4dffc55b70a9cb2897d9117ff41c5de99fbf84f216c43
-
SSDEEP
393216:G/9xm2h9ldyrBoQzWmDTryQJ+0cA7UsaRG0ILo3ki3pnfgVuqLKBTCp6:a9j27N0IeDqLm
Static task
static1
Behavioral task
behavioral1
Sample
48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3
-
Size
22.9MB
-
MD5
4427c73ab06ca8e263443d1688ee6d87
-
SHA1
bb6ff23b7576161b4e3160dd9e0ea379a224cfca
-
SHA256
48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3
-
SHA512
55bf393a9b8f0e200eac86b8702c1ad186111be0b4a1156e5d4e65a44b6802be17324c43908d1b315dd4dffc55b70a9cb2897d9117ff41c5de99fbf84f216c43
-
SSDEEP
393216:G/9xm2h9ldyrBoQzWmDTryQJ+0cA7UsaRG0ILo3ki3pnfgVuqLKBTCp6:a9j27N0IeDqLm
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-