General
-
Target
91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278
-
Size
14.2MB
-
Sample
231223-z2h4yahagr
-
MD5
01f4909c69774e58e2a2eccecab5eee6
-
SHA1
e8e0afdefb837c0afbc03f92f33b838c8cb8f23a
-
SHA256
91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278
-
SHA512
fc86f8f4feb6c6bf455ff4e8feabfa386bbb941d4fcb7e1df23dbf52d0401509961a7be424f70ce2be8d7d3fcbc15eb46f4f6db713cd4f9dfadb2d33fe2d896d
-
SSDEEP
393216:PBgNE1c/Ms2WXHF+hzhBiQ1xKy+Og+Ov9bi4xb2I52:PBgNE1m9BIzviaxwVvRln2
Static task
static1
Behavioral task
behavioral1
Sample
91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278
-
Size
14.2MB
-
MD5
01f4909c69774e58e2a2eccecab5eee6
-
SHA1
e8e0afdefb837c0afbc03f92f33b838c8cb8f23a
-
SHA256
91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278
-
SHA512
fc86f8f4feb6c6bf455ff4e8feabfa386bbb941d4fcb7e1df23dbf52d0401509961a7be424f70ce2be8d7d3fcbc15eb46f4f6db713cd4f9dfadb2d33fe2d896d
-
SSDEEP
393216:PBgNE1c/Ms2WXHF+hzhBiQ1xKy+Og+Ov9bi4xb2I52:PBgNE1m9BIzviaxwVvRln2
Score8/10-
Requests cell location
Uses Android APIs to to get current cell information.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads device software version
Uses Android APIs to read software version number for the device (IMEI/SV for GSM devices).
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-