General
-
Target
84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b
-
Size
22.6MB
-
Sample
231223-yr7h4sffbp
-
MD5
ad34c86f393fe3a2b74b3a5be804d356
-
SHA1
349b7dce65418fa2232bff24227386eefd14b8e5
-
SHA256
84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b
-
SHA512
b42a37f3fe600ea7a1111bb4879bd2cc2f8a1115b61a41d00b4b66c5a03c593474163e6904058c159e67e77a218e7648d1f7f1ebe88c94bf9a129b05b360b059
-
SSDEEP
393216:NtZOZN23A0ZqoPet9cdSRoRNL32BIdw0YX5z7BrJ8d6IoBIeUKOwTF59mWUYh+xJ:TZOrWgoPeYSRobLwwS8kSe2I+xfJH
Static task
static1
Behavioral task
behavioral1
Sample
84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b
-
Size
22.6MB
-
MD5
ad34c86f393fe3a2b74b3a5be804d356
-
SHA1
349b7dce65418fa2232bff24227386eefd14b8e5
-
SHA256
84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b
-
SHA512
b42a37f3fe600ea7a1111bb4879bd2cc2f8a1115b61a41d00b4b66c5a03c593474163e6904058c159e67e77a218e7648d1f7f1ebe88c94bf9a129b05b360b059
-
SSDEEP
393216:NtZOZN23A0ZqoPet9cdSRoRNL32BIdw0YX5z7BrJ8d6IoBIeUKOwTF59mWUYh+xJ:TZOrWgoPeYSRobLwwS8kSe2I+xfJH
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-