General
-
Target
5786acb5e308dcf2a7824cad37b4f2b8532eba3121512d13d64f6c89b9720096
-
Size
30.1MB
-
Sample
231223-vzexaabaem
-
MD5
80bdd366e0a9282bd1dae48a4054de6b
-
SHA1
85428cc48069b91bde11fc594cdf6805ac1f55ab
-
SHA256
5786acb5e308dcf2a7824cad37b4f2b8532eba3121512d13d64f6c89b9720096
-
SHA512
b6500a65f8d94374540b43641a8309d5d9c3b61d9acbad7c5497768e93b1523b851cd09626352be85f725b41636df49a006208063c060ded9069cf2bad49694b
-
SSDEEP
786432:Lr1+3kiiJ+UUmdE9SdFiotQbGZ1achRQPmW:/yihyuFntpjPEmW
Static task
static1
Behavioral task
behavioral1
Sample
5786acb5e308dcf2a7824cad37b4f2b8532eba3121512d13d64f6c89b9720096.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
5786acb5e308dcf2a7824cad37b4f2b8532eba3121512d13d64f6c89b9720096
-
Size
30.1MB
-
MD5
80bdd366e0a9282bd1dae48a4054de6b
-
SHA1
85428cc48069b91bde11fc594cdf6805ac1f55ab
-
SHA256
5786acb5e308dcf2a7824cad37b4f2b8532eba3121512d13d64f6c89b9720096
-
SHA512
b6500a65f8d94374540b43641a8309d5d9c3b61d9acbad7c5497768e93b1523b851cd09626352be85f725b41636df49a006208063c060ded9069cf2bad49694b
-
SSDEEP
786432:Lr1+3kiiJ+UUmdE9SdFiotQbGZ1achRQPmW:/yihyuFntpjPEmW
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-