General
-
Target
ca591d8e50356f5aa9d2c57e4b56e552ad9c44ffb8c42c9f3ddde0c01a226f51
-
Size
9.1MB
-
Sample
231224-eb489shdg3
-
MD5
c8b6d2ed4d8bf485c4f9e61cdd6faa04
-
SHA1
f767f7bbf81cf667b2a7122dc276fc5f3c2ab8e6
-
SHA256
ca591d8e50356f5aa9d2c57e4b56e552ad9c44ffb8c42c9f3ddde0c01a226f51
-
SHA512
aaaff312c3f2ccfc7b8f995e8fb99c8d46a42388fb53c11e827b2ce7d8ef06f80740e35a7191f7d139526205199514f34dbeecb1ecdebf77902a7f493a07aae7
-
SSDEEP
196608:jsHo4EJrLolWZGrsjEpErNorxl49yrp8XdSUdyJq:YcJXmWsrsj6uNor71EnL
Static task
static1
Behavioral task
behavioral1
Sample
ca591d8e50356f5aa9d2c57e4b56e552ad9c44ffb8c42c9f3ddde0c01a226f51.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
res.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral3
Sample
res.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral4
Sample
res.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral5
Sample
runtime-dex.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral6
Sample
runtime-dex.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral7
Sample
runtime-dex.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
ca591d8e50356f5aa9d2c57e4b56e552ad9c44ffb8c42c9f3ddde0c01a226f51
-
Size
9.1MB
-
MD5
c8b6d2ed4d8bf485c4f9e61cdd6faa04
-
SHA1
f767f7bbf81cf667b2a7122dc276fc5f3c2ab8e6
-
SHA256
ca591d8e50356f5aa9d2c57e4b56e552ad9c44ffb8c42c9f3ddde0c01a226f51
-
SHA512
aaaff312c3f2ccfc7b8f995e8fb99c8d46a42388fb53c11e827b2ce7d8ef06f80740e35a7191f7d139526205199514f34dbeecb1ecdebf77902a7f493a07aae7
-
SSDEEP
196608:jsHo4EJrLolWZGrsjEpErNorxl49yrp8XdSUdyJq:YcJXmWsrsj6uNor71EnL
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
-
-
Target
res.bin
-
Size
205KB
-
MD5
dafb7d4b90ea8d376128c625183dd9ad
-
SHA1
883c9b0586e740e9fb976d27a437e84fc26e92fd
-
SHA256
07be7e035e50b372d700b7cc148515a26b0775b2b485e50895988753fe24b12b
-
SHA512
56deefb30f358f2d404c93725f331374f0878b8121d95412ab1b1299364b2eea2b7fe179e21bbe96f4076300556a09f55825118ff67b401504c2f3b82af6b13b
-
SSDEEP
3072:jFsFh83XDWxVFkPRLccq5sOwglfnhdQkWVsXQp6D9PhTbnEaxEiQWu6vSP:jFrzWlkKcqiglfnrXDRFnEaxxaP
Score1/10 -
-
-
Target
runtime-dex.jar
-
Size
113KB
-
MD5
c7fa53a333557855a143947513ce17b8
-
SHA1
0aff6c4e758ebb67b45a6835509dedfa1555e142
-
SHA256
ff82d8e00fbf6e90a03c200f4a0eaab95b9f5589b4d8bdaecde003d8898ff130
-
SHA512
b8c09062169d938be1f7760755190adab469783ec981cb2fab2c0eb45b3299e4ea96ebe89cb3691a581946653a6db41780ae65fbbada28490b1211b0e6d957da
-
SSDEEP
1536:5m7fXuZUumsDNf634WRrlOf1TEXjIEF27j3p8zfq7IOAH+Wlw2nhH8yQmg5oixL:54Xm/V634EloTCIG2izfqtAplfcTT5Dd
Score1/10 -