General
-
Target
af2f8a35cad02bce5b6b1ac7d8d16d0091c8e6ef5192fca13ed39898f81b0e60
-
Size
19.0MB
-
Sample
231224-bfpslaeeh6
-
MD5
0020a3044211d7145e20c2e0474aa922
-
SHA1
575f06b76c5eabd4920b3f7fef272b9cacebacca
-
SHA256
af2f8a35cad02bce5b6b1ac7d8d16d0091c8e6ef5192fca13ed39898f81b0e60
-
SHA512
1a59f929ee5a6e793a8c03b7d67ac5e2200ac824357f88991557e774c171f44317a1690d916f27e366958fdfe9fb88742f5d1948e65c53d12135d52109266455
-
SSDEEP
393216:ef390AORsySq/NO9VihzZ0rF6uiJPe43zklZtZ5tMqKgo8:s9Tq/3zZ0NsLk5SqKgo8
Static task
static1
Behavioral task
behavioral1
Sample
af2f8a35cad02bce5b6b1ac7d8d16d0091c8e6ef5192fca13ed39898f81b0e60.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
af2f8a35cad02bce5b6b1ac7d8d16d0091c8e6ef5192fca13ed39898f81b0e60
-
Size
19.0MB
-
MD5
0020a3044211d7145e20c2e0474aa922
-
SHA1
575f06b76c5eabd4920b3f7fef272b9cacebacca
-
SHA256
af2f8a35cad02bce5b6b1ac7d8d16d0091c8e6ef5192fca13ed39898f81b0e60
-
SHA512
1a59f929ee5a6e793a8c03b7d67ac5e2200ac824357f88991557e774c171f44317a1690d916f27e366958fdfe9fb88742f5d1948e65c53d12135d52109266455
-
SSDEEP
393216:ef390AORsySq/NO9VihzZ0rF6uiJPe43zklZtZ5tMqKgo8:s9Tq/3zZ0NsLk5SqKgo8
Score7/10-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-