General
-
Target
491779be7f05d9fb3433f53a9688534e16add49e86b3ad01dc19d9d937c0470e
-
Size
15.8MB
-
Sample
231223-twvb5ahbcl
-
MD5
4124cd43bb8acc62bfed5c6553c0f3d1
-
SHA1
0f251d5794f54cb043502dc20941fa7e7316d01d
-
SHA256
491779be7f05d9fb3433f53a9688534e16add49e86b3ad01dc19d9d937c0470e
-
SHA512
2ad4bce576f0c471a1e6a5fa5bf191b4dea3baf0f84a0740e868a397058bb16030d174523c43560dce76eac702607189d9c5f2abeb82ad314a68129762dd5bcb
-
SSDEEP
393216:7Qa8RRSaum+aRfNsiRP6tIQdHGLpzrQ+X0oMAkOxRgYj2O054fo12KA:7P8SaEaRfNLN6tIQdmLpdXxjrw55UKA
Static task
static1
Behavioral task
behavioral1
Sample
491779be7f05d9fb3433f53a9688534e16add49e86b3ad01dc19d9d937c0470e.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
491779be7f05d9fb3433f53a9688534e16add49e86b3ad01dc19d9d937c0470e.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
491779be7f05d9fb3433f53a9688534e16add49e86b3ad01dc19d9d937c0470e
-
Size
15.8MB
-
MD5
4124cd43bb8acc62bfed5c6553c0f3d1
-
SHA1
0f251d5794f54cb043502dc20941fa7e7316d01d
-
SHA256
491779be7f05d9fb3433f53a9688534e16add49e86b3ad01dc19d9d937c0470e
-
SHA512
2ad4bce576f0c471a1e6a5fa5bf191b4dea3baf0f84a0740e868a397058bb16030d174523c43560dce76eac702607189d9c5f2abeb82ad314a68129762dd5bcb
-
SSDEEP
393216:7Qa8RRSaum+aRfNsiRP6tIQdHGLpzrQ+X0oMAkOxRgYj2O054fo12KA:7P8SaEaRfNLN6tIQdmLpdXxjrw55UKA
Score8/10-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-