General
-
Target
ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef
-
Size
13.7MB
-
Sample
231224-hqlx1saagn
-
MD5
e40367c5bdc9dd54e4fa558fe0f46fa2
-
SHA1
57c2bdb41932bc82a6af921e787a0bd7f36cc9f0
-
SHA256
ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef
-
SHA512
7619d7c3662915d71cdf4208da51bafb6467e2a1f5b907cd14f89887e4f87ebd733f02ca12368cb4671830c2f6a79c9e5aa495e3b86de765eadb6f0248138bdc
-
SSDEEP
196608:XsAlINGNyyxXaVuyHA6qY06suhDUNGa2JZiFVtcCx6z8L4TO8QKeBBnTLb7o:XsiNxN6qY0gZiP6fgeOKevnfb8
Static task
static1
Behavioral task
behavioral1
Sample
ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef.apk
Behavioral task
behavioral2
Sample
ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef.apk
Resource
android-x64-20231215-en
Malware Config
Targets
-
-
Target
ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef
-
Size
13.7MB
-
MD5
e40367c5bdc9dd54e4fa558fe0f46fa2
-
SHA1
57c2bdb41932bc82a6af921e787a0bd7f36cc9f0
-
SHA256
ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef
-
SHA512
7619d7c3662915d71cdf4208da51bafb6467e2a1f5b907cd14f89887e4f87ebd733f02ca12368cb4671830c2f6a79c9e5aa495e3b86de765eadb6f0248138bdc
-
SSDEEP
196608:XsAlINGNyyxXaVuyHA6qY06suhDUNGa2JZiFVtcCx6z8L4TO8QKeBBnTLb7o:XsiNxN6qY0gZiP6fgeOKevnfb8
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-