General
-
Target
72b964ffba7e617299c81c1b6a49fcf8eb18c4161ed0f0440adf80c30d580131
-
Size
16.7MB
-
Sample
231223-xtm2taeacp
-
MD5
a65fa1f98f015592cdca4e23dc2a52fe
-
SHA1
950bb32a6f24435f00246a8530e33706a9a9f540
-
SHA256
72b964ffba7e617299c81c1b6a49fcf8eb18c4161ed0f0440adf80c30d580131
-
SHA512
48700393123a700f8cbe3c4897d86e9b620b1ac8b1e352f3550bbb637602c4744bd0ed6a05068e1bc965cbeff7cffdecffa5b0a172f53590f6db9f2d386b6a48
-
SSDEEP
393216:indwjxZnFZksuRslaws6VPLwjyVL8VuK9Lwjeqz4:idW9uRkKPt9Zn
Static task
static1
Behavioral task
behavioral1
Sample
72b964ffba7e617299c81c1b6a49fcf8eb18c4161ed0f0440adf80c30d580131.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
72b964ffba7e617299c81c1b6a49fcf8eb18c4161ed0f0440adf80c30d580131.apk
Resource
android-x64-20231215-en
Malware Config
Targets
-
-
Target
72b964ffba7e617299c81c1b6a49fcf8eb18c4161ed0f0440adf80c30d580131
-
Size
16.7MB
-
MD5
a65fa1f98f015592cdca4e23dc2a52fe
-
SHA1
950bb32a6f24435f00246a8530e33706a9a9f540
-
SHA256
72b964ffba7e617299c81c1b6a49fcf8eb18c4161ed0f0440adf80c30d580131
-
SHA512
48700393123a700f8cbe3c4897d86e9b620b1ac8b1e352f3550bbb637602c4744bd0ed6a05068e1bc965cbeff7cffdecffa5b0a172f53590f6db9f2d386b6a48
-
SSDEEP
393216:indwjxZnFZksuRslaws6VPLwjyVL8VuK9Lwjeqz4:idW9uRkKPt9Zn
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Checks Android system properties for emulator presence.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-