General
-
Target
ac09878358891bf277996d007af4775dc04f817d3d72786fd1c6d5b7602b1428
-
Size
11.0MB
-
Sample
231224-a39wlsebe2
-
MD5
312485dc6d5f935bf5f1d21521d6e6b1
-
SHA1
b2d43d98f930ebf52fa2acddd2d6319ac65fe98a
-
SHA256
ac09878358891bf277996d007af4775dc04f817d3d72786fd1c6d5b7602b1428
-
SHA512
0a80d258f38ef163b3515187f6c0ce8cdddf5ff1b7a1aeb95504f0b1ad064ce6ec6ae87c935ae99321d956c220832228ccf09ce0626e5260ec099a28a81e5904
-
SSDEEP
196608:zFkG0UE2Yd5DMl/c+SYTPX1CcypXvh0AnEFQtDYgszS0RytnyMbumD:ZkGFE2hPR0cqZVtDY5S0gtBXD
Static task
static1
Behavioral task
behavioral1
Sample
ac09878358891bf277996d007af4775dc04f817d3d72786fd1c6d5b7602b1428.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
ac09878358891bf277996d007af4775dc04f817d3d72786fd1c6d5b7602b1428
-
Size
11.0MB
-
MD5
312485dc6d5f935bf5f1d21521d6e6b1
-
SHA1
b2d43d98f930ebf52fa2acddd2d6319ac65fe98a
-
SHA256
ac09878358891bf277996d007af4775dc04f817d3d72786fd1c6d5b7602b1428
-
SHA512
0a80d258f38ef163b3515187f6c0ce8cdddf5ff1b7a1aeb95504f0b1ad064ce6ec6ae87c935ae99321d956c220832228ccf09ce0626e5260ec099a28a81e5904
-
SSDEEP
196608:zFkG0UE2Yd5DMl/c+SYTPX1CcypXvh0AnEFQtDYgszS0RytnyMbumD:ZkGFE2hPR0cqZVtDY5S0gtBXD
Score7/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Checks the presence of a debugger
-