General
-
Target
7c3a7700c4c6b096310c499c2e1c1b4c4ca1ff3f32ea152936ca272c8da5900a
-
Size
28.6MB
-
Sample
231223-ydqnfaehcr
-
MD5
6a7b718d5029e5c249736a901487c28c
-
SHA1
1c0831b86f020f9b04ecabb816e5b203c30f4391
-
SHA256
7c3a7700c4c6b096310c499c2e1c1b4c4ca1ff3f32ea152936ca272c8da5900a
-
SHA512
632b61db410199e6a101c2afee86c0db7fa916d8643e3df526f7ba9cde174fe542a79c6eea6813e321a69d39083769f7d5d6e3658ee771566a7e647fdecaa20a
-
SSDEEP
786432:8GUosXFgrWXryVgi4I7+0/G4RS7UtkYb2Ybl:XPsX6r2AJtk+fh
Static task
static1
Behavioral task
behavioral1
Sample
7c3a7700c4c6b096310c499c2e1c1b4c4ca1ff3f32ea152936ca272c8da5900a.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
7c3a7700c4c6b096310c499c2e1c1b4c4ca1ff3f32ea152936ca272c8da5900a
-
Size
28.6MB
-
MD5
6a7b718d5029e5c249736a901487c28c
-
SHA1
1c0831b86f020f9b04ecabb816e5b203c30f4391
-
SHA256
7c3a7700c4c6b096310c499c2e1c1b4c4ca1ff3f32ea152936ca272c8da5900a
-
SHA512
632b61db410199e6a101c2afee86c0db7fa916d8643e3df526f7ba9cde174fe542a79c6eea6813e321a69d39083769f7d5d6e3658ee771566a7e647fdecaa20a
-
SSDEEP
786432:8GUosXFgrWXryVgi4I7+0/G4RS7UtkYb2Ybl:XPsX6r2AJtk+fh
Score8/10-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-