General
-
Target
af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977
-
Size
15.4MB
-
Sample
231224-bfxs7scbfj
-
MD5
9e4110df1c6ec63fa15f426aed046763
-
SHA1
ec7a997f6c3cf0edab5686f5dae2a48ab9d4aefc
-
SHA256
af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977
-
SHA512
1612bf32f3dc623198925502d802e6f20b6f633fabad443a2f79c671f324982a5e359e896e103a725f9e1ffb20db165b59a64056bcbc25872b7f30aa3931d9b2
-
SSDEEP
393216:N8O3f1KRF0/h9oEGhBzrMA/xTXGQZCiy846kv3dOJuLq3iPRwp:N73Nki/hchZb/xHTyJPHm3I+p
Static task
static1
Behavioral task
behavioral1
Sample
af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977
-
Size
15.4MB
-
MD5
9e4110df1c6ec63fa15f426aed046763
-
SHA1
ec7a997f6c3cf0edab5686f5dae2a48ab9d4aefc
-
SHA256
af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977
-
SHA512
1612bf32f3dc623198925502d802e6f20b6f633fabad443a2f79c671f324982a5e359e896e103a725f9e1ffb20db165b59a64056bcbc25872b7f30aa3931d9b2
-
SSDEEP
393216:N8O3f1KRF0/h9oEGhBzrMA/xTXGQZCiy846kv3dOJuLq3iPRwp:N73Nki/hchZb/xHTyJPHm3I+p
Score8/10-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-