General
-
Target
206db7f5b552136d53d6412e6cbc5d39
-
Size
16.2MB
-
Sample
231225-qbtcjshch9
-
MD5
206db7f5b552136d53d6412e6cbc5d39
-
SHA1
b681dcf52a9741856e4a289e6e3731fcdb9f9c30
-
SHA256
a20cbbeb133ede53993cec3757826fa642dbb83a5a8cccd19963def38a77fb00
-
SHA512
a54efa8c7474ef6c8b84b0ff770fd5ca3e2161505011b93621a2b46b2fb349a757a64833e820d011f28e735dda388c248ba12daa0c15f6e1f786d94d679fbc4c
-
SSDEEP
196608:YYD6V+U+BBgnla52FOUZJ3ZNMvre2wlN921xPY+HgRUR2Hci9S1dwVZIJIS0jZWr:Y/+dBwa4FnZGOSmd8QgNkEDMOXz0RsJl
Static task
static1
Behavioral task
behavioral1
Sample
206db7f5b552136d53d6412e6cbc5d39.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
206db7f5b552136d53d6412e6cbc5d39.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
206db7f5b552136d53d6412e6cbc5d39
-
Size
16.2MB
-
MD5
206db7f5b552136d53d6412e6cbc5d39
-
SHA1
b681dcf52a9741856e4a289e6e3731fcdb9f9c30
-
SHA256
a20cbbeb133ede53993cec3757826fa642dbb83a5a8cccd19963def38a77fb00
-
SHA512
a54efa8c7474ef6c8b84b0ff770fd5ca3e2161505011b93621a2b46b2fb349a757a64833e820d011f28e735dda388c248ba12daa0c15f6e1f786d94d679fbc4c
-
SSDEEP
196608:YYD6V+U+BBgnla52FOUZJ3ZNMvre2wlN921xPY+HgRUR2Hci9S1dwVZIJIS0jZWr:Y/+dBwa4FnZGOSmd8QgNkEDMOXz0RsJl
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-