General
-
Target
7c318484b67940ff92de38a35a784d0209457cd32633a0c3855d32e26dacaf10
-
Size
25.5MB
-
Sample
231223-ydkgesehcn
-
MD5
bb44b2665ac40b3458e3f9cb12acf96e
-
SHA1
948e97c556879dad253103329400ab128fd60e72
-
SHA256
7c318484b67940ff92de38a35a784d0209457cd32633a0c3855d32e26dacaf10
-
SHA512
c8fd040cc28780439647b0eaba7723f24479244698575ea239fba63c32c6124f0921a5a91f07082bd9356a785e048d7e8d8246c9d44fbe85816935a91eb0d8b5
-
SSDEEP
786432:JjEkKS9YZWSrdgmc9h1lnz/9kuexSYRHb6:hKS95KyVnRL0Z76
Static task
static1
Behavioral task
behavioral1
Sample
7c318484b67940ff92de38a35a784d0209457cd32633a0c3855d32e26dacaf10.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
7c318484b67940ff92de38a35a784d0209457cd32633a0c3855d32e26dacaf10
-
Size
25.5MB
-
MD5
bb44b2665ac40b3458e3f9cb12acf96e
-
SHA1
948e97c556879dad253103329400ab128fd60e72
-
SHA256
7c318484b67940ff92de38a35a784d0209457cd32633a0c3855d32e26dacaf10
-
SHA512
c8fd040cc28780439647b0eaba7723f24479244698575ea239fba63c32c6124f0921a5a91f07082bd9356a785e048d7e8d8246c9d44fbe85816935a91eb0d8b5
-
SSDEEP
786432:JjEkKS9YZWSrdgmc9h1lnz/9kuexSYRHb6:hKS95KyVnRL0Z76
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-