General
-
Target
53e7e33ddba4d732327f350b46ffe466
-
Size
21.3MB
-
Sample
231226-e1s8asefa7
-
MD5
53e7e33ddba4d732327f350b46ffe466
-
SHA1
74a9d93dc5230abf1156b17fe96d73137d644bc4
-
SHA256
1a1f9d3a756cf58061df0b106a272777cfd07f393f8733794f171cbc751e7781
-
SHA512
d95a030f586f51cbb6a322abb0ccd3ce90f79863464f61aa085ed7ca90136ddd7a2244714cb2d5e652de2cfc97ff74ab29fd60dff207650c39ea3eab8d3ea5ae
-
SSDEEP
393216:akgapbGplDrRVclilzVdP7ybL4nU2LRGOcTR0reqijuc:a+cDVPXO0UsgqCqiL
Static task
static1
Behavioral task
behavioral1
Sample
53e7e33ddba4d732327f350b46ffe466.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
53e7e33ddba4d732327f350b46ffe466.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
gdtadv2.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
53e7e33ddba4d732327f350b46ffe466
-
Size
21.3MB
-
MD5
53e7e33ddba4d732327f350b46ffe466
-
SHA1
74a9d93dc5230abf1156b17fe96d73137d644bc4
-
SHA256
1a1f9d3a756cf58061df0b106a272777cfd07f393f8733794f171cbc751e7781
-
SHA512
d95a030f586f51cbb6a322abb0ccd3ce90f79863464f61aa085ed7ca90136ddd7a2244714cb2d5e652de2cfc97ff74ab29fd60dff207650c39ea3eab8d3ea5ae
-
SSDEEP
393216:akgapbGplDrRVclilzVdP7ybL4nU2LRGOcTR0reqijuc:a+cDVPXO0UsgqCqiL
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
gdtadv2.jar
-
Size
1.2MB
-
MD5
662214e53416cc2f6786373345526786
-
SHA1
da86e4dcc4290ad616259a635c7b01741a733109
-
SHA256
fd36e3e8fa5771e48b8fa2f3d9abb4cdea15983bafabcb6bbc6fe8a5bb3676b6
-
SHA512
55feb6c3973a8a96573952cb95b95eb9fd9420e80d305dc592bc42e01742fdfc76cfe0e8e44fa8e1b2b0e5620c99aed701632cd44ff2f798ba42b4d773c91177
-
SSDEEP
24576:9eGqTvtl7F7Qj7DiSkKoPRlUMGZNHc1Llm06poH1iKbncR/nd2Z8:QGqDF+7DiSGw7CLlV2mIKbcR/ndm8
Score1/10 -