General
-
Target
3e49bcfc58defb6077e9661cadaa458c
-
Size
20.7MB
-
Sample
240102-spm4ssbac9
-
MD5
3e49bcfc58defb6077e9661cadaa458c
-
SHA1
32021fe4bd5dd0f656e1f39aa60425f31e95d77d
-
SHA256
f89ef57c7df0a0fa0c323efeb13e063712ee3512c05ba9d40dff7fc20539fa04
-
SHA512
d9f2ffbcf412d8e84a6d7b3c77d5c91e40c7363c2730d36361be7e8a79afd1b1e6221207192762a2d9dbfe79ddc4dd81686b3c9b660e1c2cc0660781c73e491d
-
SSDEEP
393216:DX0l36NVqLplXEm9fyf/PnRQ7MjQz9PkTfnnOSjWebvr7LV1qG/RxrOJEz:DX+yqLplXEm9fyvRQ7UQzmfnOSVDzOGz
Static task
static1
Malware Config
Targets
-
-
Target
3e49bcfc58defb6077e9661cadaa458c
-
Size
20.7MB
-
MD5
3e49bcfc58defb6077e9661cadaa458c
-
SHA1
32021fe4bd5dd0f656e1f39aa60425f31e95d77d
-
SHA256
f89ef57c7df0a0fa0c323efeb13e063712ee3512c05ba9d40dff7fc20539fa04
-
SHA512
d9f2ffbcf412d8e84a6d7b3c77d5c91e40c7363c2730d36361be7e8a79afd1b1e6221207192762a2d9dbfe79ddc4dd81686b3c9b660e1c2cc0660781c73e491d
-
SSDEEP
393216:DX0l36NVqLplXEm9fyf/PnRQ7MjQz9PkTfnnOSjWebvr7LV1qG/RxrOJEz:DX+yqLplXEm9fyvRQ7UQzmfnOSVDzOGz
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Acquires the wake lock
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-