General
-
Target
f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065
-
Size
16.0MB
-
Sample
231224-jbdtjadae4
-
MD5
c088ca801cf91e678b8d5f6eee26ab36
-
SHA1
4959bd44fe9ad2c5933538c9f3c5cbe09383d929
-
SHA256
f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065
-
SHA512
cd989f8d239743deafee227c1c93d3296c66341402f8b71c86be30e77911b84d504df2363910e12bc399db8b7cb34fafcd826e245adbdffa96d13cc0123f6a92
-
SSDEEP
393216:/+84G56McFldVGX3fX6W1oQRddrI9nbEI8WQzhRcem:/55rcF90fX6WCMKiNRE
Static task
static1
Behavioral task
behavioral1
Sample
f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065.apk
Behavioral task
behavioral2
Sample
f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065
-
Size
16.0MB
-
MD5
c088ca801cf91e678b8d5f6eee26ab36
-
SHA1
4959bd44fe9ad2c5933538c9f3c5cbe09383d929
-
SHA256
f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065
-
SHA512
cd989f8d239743deafee227c1c93d3296c66341402f8b71c86be30e77911b84d504df2363910e12bc399db8b7cb34fafcd826e245adbdffa96d13cc0123f6a92
-
SSDEEP
393216:/+84G56McFldVGX3fX6W1oQRddrI9nbEI8WQzhRcem:/55rcF90fX6WCMKiNRE
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-