General
-
Target
87737b439677672fa4a64844a5eea7182ff09f1a47149a3294974b9785cccd85
-
Size
12.2MB
-
Sample
231223-y1srbafhfp
-
MD5
fb59d9acac06545887b9719589182510
-
SHA1
c2940fdd2149a8f7c94d0e071cbdefb7401371b7
-
SHA256
87737b439677672fa4a64844a5eea7182ff09f1a47149a3294974b9785cccd85
-
SHA512
e81f22bb10ca294fe07aab93862cb28bc90a6c20004fdaecee3f8c39a05b171f83aba79278a3a9386f5a3f5fd722ccea289e5e0690c1102a85d0928f16d4402c
-
SSDEEP
393216:+F5w25j44nIy9FrhMGKmLiut6woOj+Kh0HK/r:+vw25j44npjar6ilNV/S
Static task
static1
Behavioral task
behavioral1
Sample
87737b439677672fa4a64844a5eea7182ff09f1a47149a3294974b9785cccd85.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
alipay_msp.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
87737b439677672fa4a64844a5eea7182ff09f1a47149a3294974b9785cccd85
-
Size
12.2MB
-
MD5
fb59d9acac06545887b9719589182510
-
SHA1
c2940fdd2149a8f7c94d0e071cbdefb7401371b7
-
SHA256
87737b439677672fa4a64844a5eea7182ff09f1a47149a3294974b9785cccd85
-
SHA512
e81f22bb10ca294fe07aab93862cb28bc90a6c20004fdaecee3f8c39a05b171f83aba79278a3a9386f5a3f5fd722ccea289e5e0690c1102a85d0928f16d4402c
-
SSDEEP
393216:+F5w25j44nIy9FrhMGKmLiut6woOj+Kh0HK/r:+vw25j44npjar6ilNV/S
Score6/10-
Reads information about phone network operator.
-
-
-
Target
alipay_msp.apk
-
Size
354KB
-
MD5
89c04e1ebcd58eca6dd93211628ed0bc
-
SHA1
7d1e77ce25a635299704dbd95bd95c697572ea9d
-
SHA256
ee3c608fff51b313f4e0b3e542bedccb4d4db4c8eb44e63bf4be0d468e9ee117
-
SHA512
3dccaeff9906401855f3071c91012926d7e9250674ea0bb89606e4862223a8343fc7b9369afe4e50031d261b45437107c018f565da5615c49721c3bf1bf6ed01
-
SSDEEP
6144:cH8LfOo+BjGVN8TdW4zxgnm1Us3JuOK2vf5C8EcPK+WvyQcQ2fnq7:cHLxBiVN8pWggmlY25CLE8RcQ2fnq7
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-