General
-
Target
0d259dcb39e18fbc5d95ffc6159a6fd8
-
Size
18.6MB
-
Sample
231230-d52jssddcq
-
MD5
0d259dcb39e18fbc5d95ffc6159a6fd8
-
SHA1
1c6cb440c6aaa0685e608849565e46f7b7148aaa
-
SHA256
79c0fbef66d854aff091426a13d36c18e9a3753b3eb6050c77e981ee3342b211
-
SHA512
6f7c05f5fe6eb57e9448df2eb66a5d68db0d7c95b596c8f2fb53d96ee008c70fcaa95a440041e6a74118f56f3b29dedaf454b52c76cb98d96b94bdee2e3e8c50
-
SSDEEP
393216:3oSOik2jckcip4n6r+aXinjEw/zuaLp8m+ifOkwIl39OggUqa:YT2jck3466adOp8j+lN73
Static task
static1
Behavioral task
behavioral1
Sample
0d259dcb39e18fbc5d95ffc6159a6fd8.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
0d259dcb39e18fbc5d95ffc6159a6fd8.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
0d259dcb39e18fbc5d95ffc6159a6fd8
-
Size
18.6MB
-
MD5
0d259dcb39e18fbc5d95ffc6159a6fd8
-
SHA1
1c6cb440c6aaa0685e608849565e46f7b7148aaa
-
SHA256
79c0fbef66d854aff091426a13d36c18e9a3753b3eb6050c77e981ee3342b211
-
SHA512
6f7c05f5fe6eb57e9448df2eb66a5d68db0d7c95b596c8f2fb53d96ee008c70fcaa95a440041e6a74118f56f3b29dedaf454b52c76cb98d96b94bdee2e3e8c50
-
SSDEEP
393216:3oSOik2jckcip4n6r+aXinjEw/zuaLp8m+ifOkwIl39OggUqa:YT2jck3466adOp8j+lN73
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks Android system properties for emulator presence.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-