General
-
Target
5024f0a56ab2a32bc149ebd9a840960c
-
Size
22.2MB
-
Sample
240110-kxq7esdcg5
-
MD5
5024f0a56ab2a32bc149ebd9a840960c
-
SHA1
e13661d4e6f419ee807b61c353291d88c76251ac
-
SHA256
a3ba11b1bd8922cd965e1c18c831d73ffed8ad72f59c5b76c18711b556aa7d05
-
SHA512
d07744ad4b5c5165f18b61946b10cc86a7e05d211e5aa63351547f2dfb30a5b502665d59f9f78c6d1fcaa2bff0a50ad5adae4304c702ab9585522d0a388f84e6
-
SSDEEP
393216:YaUS+6c0uifK4FYAQ5j5gah4ndKXW5ckls6LquGvxKqg7MSo5SX8P/mHc16wpzF3:v91ii3aAQ5j5g4EdKG5s6LBqgqSMGHc7
Static task
static1
Behavioral task
behavioral1
Sample
5024f0a56ab2a32bc149ebd9a840960c.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
5024f0a56ab2a32bc149ebd9a840960c
-
Size
22.2MB
-
MD5
5024f0a56ab2a32bc149ebd9a840960c
-
SHA1
e13661d4e6f419ee807b61c353291d88c76251ac
-
SHA256
a3ba11b1bd8922cd965e1c18c831d73ffed8ad72f59c5b76c18711b556aa7d05
-
SHA512
d07744ad4b5c5165f18b61946b10cc86a7e05d211e5aa63351547f2dfb30a5b502665d59f9f78c6d1fcaa2bff0a50ad5adae4304c702ab9585522d0a388f84e6
-
SSDEEP
393216:YaUS+6c0uifK4FYAQ5j5gah4ndKXW5ckls6LquGvxKqg7MSo5SX8P/mHc16wpzF3:v91ii3aAQ5j5g4EdKG5s6LBqgqSMGHc7
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Reads information about phone network operator.
-