General
-
Target
1ba121478f8c511840f4cbe316abfc68
-
Size
24.5MB
-
Sample
231230-y1q8gscdbp
-
MD5
1ba121478f8c511840f4cbe316abfc68
-
SHA1
eafad4e2e7a15b3a37701886e45bd7b91a0ac3ce
-
SHA256
ee2a06a5edd015b9d769fdd8a15b876ac6842ef129a57348c4c15c6984b7dc71
-
SHA512
4e870a7f73812a42898a8d2c000a976397f48d84c4349202a1491f5cc67105e6cdeb9d424ecfa4a9b7b90ac76c9aac7571ddca6cb1d2064bed5130e95ea6f014
-
SSDEEP
786432:V8BTgQhTdl1vMzNtzVZ3Cxstb+DBGRswd:VqTjZ7aNtzyxqb+sh
Static task
static1
Behavioral task
behavioral1
Sample
1ba121478f8c511840f4cbe316abfc68.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
1ba121478f8c511840f4cbe316abfc68.apk
Resource
android-x64-20231215-en
Malware Config
Targets
-
-
Target
1ba121478f8c511840f4cbe316abfc68
-
Size
24.5MB
-
MD5
1ba121478f8c511840f4cbe316abfc68
-
SHA1
eafad4e2e7a15b3a37701886e45bd7b91a0ac3ce
-
SHA256
ee2a06a5edd015b9d769fdd8a15b876ac6842ef129a57348c4c15c6984b7dc71
-
SHA512
4e870a7f73812a42898a8d2c000a976397f48d84c4349202a1491f5cc67105e6cdeb9d424ecfa4a9b7b90ac76c9aac7571ddca6cb1d2064bed5130e95ea6f014
-
SSDEEP
786432:V8BTgQhTdl1vMzNtzVZ3Cxstb+DBGRswd:VqTjZ7aNtzyxqb+sh
Score8/10-
Requests cell location
Uses Android APIs to to get current cell information.
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-