General
-
Target
5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97
-
Size
16.6MB
-
Sample
231223-wk4sjaebe3
-
MD5
4f4836c37e257bba0d5a9456708e4021
-
SHA1
1d2e5648f1604c89b0e62903a05536b0ad7aa0a6
-
SHA256
5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97
-
SHA512
ef6fc2ea0df484342f3a9056bcbe816eca7570e780b94656c892e4205828255158afa3c7c3ed52210b273f0430fbbba939fed282caab7621ac254f3691200fcb
-
SSDEEP
393216:CS/lntGc13ytZ0m97p0sEN6opj2VL8bu59LwkeqrOiAt:CcNQc13yz0mb0NNHTU9Y7/
Static task
static1
Behavioral task
behavioral1
Sample
5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97
-
Size
16.6MB
-
MD5
4f4836c37e257bba0d5a9456708e4021
-
SHA1
1d2e5648f1604c89b0e62903a05536b0ad7aa0a6
-
SHA256
5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97
-
SHA512
ef6fc2ea0df484342f3a9056bcbe816eca7570e780b94656c892e4205828255158afa3c7c3ed52210b273f0430fbbba939fed282caab7621ac254f3691200fcb
-
SSDEEP
393216:CS/lntGc13ytZ0m97p0sEN6opj2VL8bu59LwkeqrOiAt:CcNQc13yz0mb0NNHTU9Y7/
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-