General
-
Target
78fa950df8e85e4866fbd9536567d1cd
-
Size
3.0MB
-
Sample
240127-ccl3zaaha3
-
MD5
78fa950df8e85e4866fbd9536567d1cd
-
SHA1
b456d8806dbd21342773f73f120e64f7b0f3f8f7
-
SHA256
20f45f1e7206b07876501aa829adae3e54b3620e733e7b8fee04c448078143b6
-
SHA512
606821bd1afcaf6e7179881b6198f24619fd84efb9bf5e2e3d68b47b4510832c12af279993bac0c9f33c080767b62dd9742946be1ecb80c5d6802c67298c1658
-
SSDEEP
49152:GfieXW1WFm4lnNQ/ZQ7TRcBALMcdg6Y4bAQNFZtqUJS8Zwz5f8Qo+pa:GqeX7k47QQRcDcGN8Z6hk+g
Static task
static1
Behavioral task
behavioral1
Sample
78fa950df8e85e4866fbd9536567d1cd.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
78fa950df8e85e4866fbd9536567d1cd.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
78fa950df8e85e4866fbd9536567d1cd.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
78fa950df8e85e4866fbd9536567d1cd
-
Size
3.0MB
-
MD5
78fa950df8e85e4866fbd9536567d1cd
-
SHA1
b456d8806dbd21342773f73f120e64f7b0f3f8f7
-
SHA256
20f45f1e7206b07876501aa829adae3e54b3620e733e7b8fee04c448078143b6
-
SHA512
606821bd1afcaf6e7179881b6198f24619fd84efb9bf5e2e3d68b47b4510832c12af279993bac0c9f33c080767b62dd9742946be1ecb80c5d6802c67298c1658
-
SSDEEP
49152:GfieXW1WFm4lnNQ/ZQ7TRcBALMcdg6Y4bAQNFZtqUJS8Zwz5f8Qo+pa:GqeX7k47QQRcDcGN8Z6hk+g
Score10/10-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-