General
-
Target
ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214
-
Size
13.9MB
-
Sample
231224-eb8xfsehdp
-
MD5
d9b6791b42abe0a1d98388874996befc
-
SHA1
34f862a415c87b2baf32aef7d5a2d34a08987f8a
-
SHA256
ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214
-
SHA512
ed9298c40176ce70c9c062ec51cf6b5cb9eb661f1ba17bbd0fe4598487e8ea089cecf7bea71c7fdf889bc1b6909232dd048d080efec0f5bb63d26a7e249919c6
-
SSDEEP
393216:O15OG2ENl4aSppIQ4y9QpUHJwIanMDzolysshm:gEijS+Q4yrHJwIEizoINm
Static task
static1
Behavioral task
behavioral1
Sample
ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214
-
Size
13.9MB
-
MD5
d9b6791b42abe0a1d98388874996befc
-
SHA1
34f862a415c87b2baf32aef7d5a2d34a08987f8a
-
SHA256
ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214
-
SHA512
ed9298c40176ce70c9c062ec51cf6b5cb9eb661f1ba17bbd0fe4598487e8ea089cecf7bea71c7fdf889bc1b6909232dd048d080efec0f5bb63d26a7e249919c6
-
SSDEEP
393216:O15OG2ENl4aSppIQ4y9QpUHJwIanMDzolysshm:gEijS+Q4yrHJwIEizoINm
Score7/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
-
-
Target
gdtadv2.jar
-
Size
636KB
-
MD5
cf57d4f9f2ccd86816c4f02989252423
-
SHA1
6978f24478ba9baa004bf4d21db251fe67957ec2
-
SHA256
e6df28c535e661d33a134407674c32555fb985a6a8f3bf8ec743150db61fa7ec
-
SHA512
f759aea4c4fb91ce69f8238bd0e7c0f99b826cad04fc9c5f47c5afde2eceaf71d515d00f0e08b73c169e1a8bd21a17ddd3971bae27ddeb6960daaf5c5d719d4b
-
SSDEEP
12288:lsocNwAPog24tsNbfevYHzN953QZlo5M0f+DMpP7x07S232vjUG:MNvPA9oYHzN953QEM0npDx0nm
Score1/10 -