General
-
Target
a6d70c0f1660fd9ac9e45be3d78db72ba64d8a6152334bbf88460d101058e27e
-
Size
19.4MB
-
Sample
231224-ahmkksdfc3
-
MD5
971760b5d5ce3a6d692589cdcb94283f
-
SHA1
63c65a4b89ee4c33bb05f6928df50e4c5647d336
-
SHA256
a6d70c0f1660fd9ac9e45be3d78db72ba64d8a6152334bbf88460d101058e27e
-
SHA512
32b7ef26d177760620df5e7578a8776d405cac88ebc34a11ff9f9b41bca9183e42e3206e979b06d2935c1be6ecc8603356f7a324e2de58a73149e12b3e1821d3
-
SSDEEP
393216:XM+EMItxA36WA8q+iuN3J1vKi5FtLhln2zDdF:XdExxLWA8q+7JfFtLhln+
Static task
static1
Behavioral task
behavioral1
Sample
a6d70c0f1660fd9ac9e45be3d78db72ba64d8a6152334bbf88460d101058e27e.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
a6d70c0f1660fd9ac9e45be3d78db72ba64d8a6152334bbf88460d101058e27e
-
Size
19.4MB
-
MD5
971760b5d5ce3a6d692589cdcb94283f
-
SHA1
63c65a4b89ee4c33bb05f6928df50e4c5647d336
-
SHA256
a6d70c0f1660fd9ac9e45be3d78db72ba64d8a6152334bbf88460d101058e27e
-
SHA512
32b7ef26d177760620df5e7578a8776d405cac88ebc34a11ff9f9b41bca9183e42e3206e979b06d2935c1be6ecc8603356f7a324e2de58a73149e12b3e1821d3
-
SSDEEP
393216:XM+EMItxA36WA8q+iuN3J1vKi5FtLhln2zDdF:XdExxLWA8q+7JfFtLhln+
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-