General
-
Target
e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a
-
Size
12.5MB
-
Sample
231224-gwb5bsbfb9
-
MD5
8a78c2e9c9675a107c79a1f3c4ce1f01
-
SHA1
7122475541fc929bd4ea1fc65bfe4d2c8d63cc63
-
SHA256
e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a
-
SHA512
8ac9e3288c2b664e9811cd4b164e3ac7fe03ba7e3ea84569d5f23e15b21f79bd40aebfa8a2ac65b12ab15ed535325784db1f78e48b22f86397a5d8a2d5b05211
-
SSDEEP
393216:PMcvpuZSsmiyMWO9IyCZUKtOYvMa3MQ/VxpQiHI6gb:EvSsDwO9IfDZvcQ/lHItb
Static task
static1
Behavioral task
behavioral1
Sample
e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a.apk
Behavioral task
behavioral2
Sample
e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Malware Config
Targets
-
-
Target
e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a
-
Size
12.5MB
-
MD5
8a78c2e9c9675a107c79a1f3c4ce1f01
-
SHA1
7122475541fc929bd4ea1fc65bfe4d2c8d63cc63
-
SHA256
e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a
-
SHA512
8ac9e3288c2b664e9811cd4b164e3ac7fe03ba7e3ea84569d5f23e15b21f79bd40aebfa8a2ac65b12ab15ed535325784db1f78e48b22f86397a5d8a2d5b05211
-
SSDEEP
393216:PMcvpuZSsmiyMWO9IyCZUKtOYvMa3MQ/VxpQiHI6gb:EvSsDwO9IfDZvcQ/lHItb
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
443KB
-
MD5
232146e2595dbcc4917a3ae7b3663b3c
-
SHA1
3deedba5289f3eddc87cf35c06ba6c6aa1380275
-
SHA256
abbda9c3353d88c4de9df8880b962fe7958c610cbf54e3e57568af80cd504711
-
SHA512
43fc0b3687d54dfaecc0a53ce290c59ba4b35540b0348f28edede81fd8e96888dabe7c008eb0d1d8d4fd23c76ace1ff570dd9175695f25a5aaad055f1dfc0d69
-
SSDEEP
6144:Nvd0m3MKiQr/B49UXhtjKzGLCrR8A5ZpKkUuf/nVo9v1LIMyXiBqpMoZInOrGPuB:j1F/BkURZdiL7UInV8xIbXolwCO6xu
ScoreN/A -