General
-
Target
be6249483d45442fe887d7aec3a25ee19b26a0db8de73cccb81778434c4cf3c1
-
Size
5.3MB
-
Sample
231224-c8c5yadgak
-
MD5
f326cd9ace12d9d2320893ccba6a431c
-
SHA1
90d736d2a39815940e00c89e008e1fb6b94c2a5d
-
SHA256
be6249483d45442fe887d7aec3a25ee19b26a0db8de73cccb81778434c4cf3c1
-
SHA512
e183e05fa84b74a66da438977decf0d369728841ebe9ec4e5b56c1ebe64edca3c2dd86d0539a6f4d8cf8f525c80b06d17444657bbdfadecfacd9d82d3b534702
-
SSDEEP
98304:N2wUI8heMn4s7r9YMDDKC56zXFDvlHR8dpRbkkup/61H8ILkl9zzQNMjczNk6hEY:QoMn4yFZqZHR8dpGb0O9zz+MjmGQEnY
Static task
static1
Behavioral task
behavioral1
Sample
be6249483d45442fe887d7aec3a25ee19b26a0db8de73cccb81778434c4cf3c1.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
UPPayPluginEx.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral3
Sample
UPPayPluginEx.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral4
Sample
plugin-deploy.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral5
Sample
plugin-deploy.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral6
Sample
plugin-deploy.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
be6249483d45442fe887d7aec3a25ee19b26a0db8de73cccb81778434c4cf3c1
-
Size
5.3MB
-
MD5
f326cd9ace12d9d2320893ccba6a431c
-
SHA1
90d736d2a39815940e00c89e008e1fb6b94c2a5d
-
SHA256
be6249483d45442fe887d7aec3a25ee19b26a0db8de73cccb81778434c4cf3c1
-
SHA512
e183e05fa84b74a66da438977decf0d369728841ebe9ec4e5b56c1ebe64edca3c2dd86d0539a6f4d8cf8f525c80b06d17444657bbdfadecfacd9d82d3b534702
-
SSDEEP
98304:N2wUI8heMn4s7r9YMDDKC56zXFDvlHR8dpRbkkup/61H8ILkl9zzQNMjczNk6hEY:QoMn4yFZqZHR8dpGb0O9zz+MjmGQEnY
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads information about phone network operator.
-
-
-
Target
UPPayPluginEx.apk
-
Size
523KB
-
MD5
3d6aa84a576f77d4f719be28f42df500
-
SHA1
02783dc44f69f434616fd99630774d877c3ca4ae
-
SHA256
df5bcde233bdce80079a67953ef4badeec52fbcf45ec536138152ca8bd6cad6b
-
SHA512
a46209660edb7216d219543b875c2fe5598d0578d19092a02cd2daf3e2f3e4491509b75c12c768a5a38080a1ef76145bce770ae989df252a0e16ef66c742f46e
-
SSDEEP
12288:LjEfQf5pyq98OVuaR7T8LxoOpSbJL7LP6YqCrCimO9FLbl6Qx:Hxhpd8GuC4mOpSbJL7LCYXl+y
Score1/10 -
-
-
Target
plugin-deploy.jar
-
Size
202KB
-
MD5
610ae20fa40cb991ef4670582bc3996a
-
SHA1
bad8dbc9b7226fbd4f1b97dabe777c36605ccc9b
-
SHA256
010690c6a9fe3d6e21c33940453cb2a5c41e26ac24ea42e3732111613701eede
-
SHA512
8584fa3850e97276d6afef61dff9401531cd7830a3a7660fcc3b75c21c55196a59efad46ad763f1695f59c99874e29aa285ba9d9f43a5989d004a0e115d76b1b
-
SSDEEP
3072:KZka1USzNNXt2YZvCb/VSD2h/8b1pHOfRmmFSB/0wTMVM6OZBryCFqCNh0Tbu/7f:KFz7XXWVSD2qb1pMRmIY/IkR/qCNOTC7
Score1/10 -