General
-
Target
7221820610ce7caa1ec63b69e3d00331
-
Size
5.4MB
-
Sample
240124-npd4nshca5
-
MD5
7221820610ce7caa1ec63b69e3d00331
-
SHA1
1275479164fb175cd27c1368346169aaa9de648c
-
SHA256
ddeb26152cf346555d6323bf562438544a35eb5a70e523bf41a2b1f65a4f65c8
-
SHA512
d57c39a9b0a3d42043425b61d364baff42cb5abae9e855a23dfba8accaf25cc150453c22d0414d64708d588cd4391b402ca947e29131e8f9525aeb90befd3405
-
SSDEEP
98304:zlH+AMSxQrZf1bjvB86RRIYomcA6prm9yeX8JVYpqTgHQL6BR72eTw72w:ZeAkf1bNRymcJpq9BXwgwL6DSeuZ
Static task
static1
Behavioral task
behavioral1
Sample
7221820610ce7caa1ec63b69e3d00331.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
7221820610ce7caa1ec63b69e3d00331.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
7221820610ce7caa1ec63b69e3d00331
-
Size
5.4MB
-
MD5
7221820610ce7caa1ec63b69e3d00331
-
SHA1
1275479164fb175cd27c1368346169aaa9de648c
-
SHA256
ddeb26152cf346555d6323bf562438544a35eb5a70e523bf41a2b1f65a4f65c8
-
SHA512
d57c39a9b0a3d42043425b61d364baff42cb5abae9e855a23dfba8accaf25cc150453c22d0414d64708d588cd4391b402ca947e29131e8f9525aeb90befd3405
-
SSDEEP
98304:zlH+AMSxQrZf1bjvB86RRIYomcA6prm9yeX8JVYpqTgHQL6BR72eTw72w:ZeAkf1bNRymcJpq9BXwgwL6DSeuZ
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-