Malware Analysis Report

2024-10-19 12:57

Sample ID 240219-1ykn2aeh42
Target 0aa73f6a672c97dbfce28d348c68921c05a405de7d40e4fd982c6f67a8f1fcf6.bin
SHA256 0aa73f6a672c97dbfce28d348c68921c05a405de7d40e4fd982c6f67a8f1fcf6
Tags
octo banker evasion infostealer rat stealth trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0aa73f6a672c97dbfce28d348c68921c05a405de7d40e4fd982c6f67a8f1fcf6

Threat Level: Known bad

The file 0aa73f6a672c97dbfce28d348c68921c05a405de7d40e4fd982c6f67a8f1fcf6.bin was found to be: Known bad.

Malicious Activity Summary

octo banker evasion infostealer rat stealth trojan

Octo

Octo payload

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Makes use of the framework's Accessibility service

Removes its main activity from the application launcher

Loads dropped Dex/Jar

Acquires the wake lock

Declares broadcast receivers with permission to handle system events

Declares services with permission to bind to the system

Reads information about phone network operator.

Requests disabling of battery optimizations (often used to enable hiding in the background).

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-02-19 22:03

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-19 22:03

Reported

2024-02-19 22:20

Platform

android-x86-arm-20231215-en

Max time kernel

144s

Max time network

150s

Command Line

com.singreal1

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Makes use of the framework's Accessibility service

Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker
Description Indicator Process Target
Framework service call android.content.pm.IPackageManager.getInstalledApplications N/A N/A

Removes its main activity from the application launcher

stealth trojan
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.singreal1/cache/hjienb N/A N/A
N/A /data/user/0/com.singreal1/cache/hjienb N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.singreal1

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.200.10:443 semanticlocation-pa.googleapis.com tcp
US 1.1.1.1:53 www.ip-api.com udp
US 1.1.1.1:53 asamanaproductioneditionpskl.net udp
US 208.95.112.1:80 www.ip-api.com tcp
US 1.1.1.1:53 asamanaproductioneditionkdna.net udp
US 1.1.1.1:53 asamanaproductioneditionksla.net udp
RU 91.240.118.224:443 91.240.118.224 tcp
US 1.1.1.1:53 asamanaproductioneditionctfm.com udp
RU 91.240.118.224:443 91.240.118.224 tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
RU 91.240.118.224:443 91.240.118.224 tcp
RU 91.240.118.224:443 91.240.118.224 tcp
GB 142.250.179.234:443 semanticlocation-pa.googleapis.com tcp
RU 91.240.118.224:443 91.240.118.224 tcp
RU 91.240.118.224:443 91.240.118.224 tcp
RU 91.240.118.224:443 91.240.118.224 tcp

Files

/data/data/com.singreal1/cache/hjienb

MD5 a6c3db371c1aac6b76e0bdc05f5961f9
SHA1 d6d32607d1bc6a19da2a31caa1c3100291d83133
SHA256 718cf60139d3ee6c2509fe0cb32075fa34bb94df8192f1f02557b7fe07d3f9ed
SHA512 79f1f7588b33a2081b0170a3f82d5b1cde632af6032a20128fd962ed0e6e17a0b7629f306c937511fbd1f304847e53161e12c447e7eae452aaa17305aa7a7a0e

/data/user/0/com.singreal1/cache/hjienb

MD5 97070dd36f79ad5c209abb2cf5171a1c
SHA1 ac99fff03b15d9429a08fd53a16a3b467b2619a5
SHA256 96c5fe7c50e98f015de4c144498b6b0adcd26fb919e57bc4bf79ae5d395ee59b
SHA512 caffe0fdbb34dd532cd9e02f0875b5ff3be547a168e6b69356edad2fb019fff496d41b988851c61ada2b069ef2b89e934c41d79bde1a13d596a44847849f4ddf

/data/data/com.singreal1/kl.txt

MD5 f488ba8e46814b992bca4b66dbb2246f
SHA1 ce8af994a5de754cf1921e8a9f8cfc7dd634f728
SHA256 19d6d48e82158a0a12d0cb746626a84436163e1495bf71c8b47ec3aa3f1a6aee
SHA512 5e32e0b235c268e8048f7a48680f6ebc8ed8b67d08571b7ec53d1e77e51a96c0c97d5f0e3bf68f16b3de326c021949a9446b5dc5ce300a9b1d4f83ed5969e342

/data/data/com.singreal1/kl.txt

MD5 498caab94bab3079d4926d42c2f71b40
SHA1 c724471559523d3380f3161f885abf0446d50b3b
SHA256 e15ac29610c7ebcd40cb5797483e406d845f8d3867ce418e6043458e7deed6e4
SHA512 2ec9f8b18aeb5f9ea2a39cfdb36ea3393987d70297415d966f0986f0a87939cf0d347846e12051591b10fa4059bddf9418b00bd3ee93b1ec91e0b3d898c889bc

/data/data/com.singreal1/kl.txt

MD5 ef9c3ad09161e52164b3b781f426e9e4
SHA1 34ceb0e510b777190af74d9fc95bc2b45a8a8735
SHA256 5385d163370c57f7239c8f730c685f1677a0794a76c66649bce69589795f81f8
SHA512 01a1654a0fd88601bd4b954b4cd930e127d82cde1e642d2f4fc4ba375f61483504cfa958d813b5e3e269d1a672d4f9b4314905d710e6a82be53b8f5077cba32e

/data/data/com.singreal1/kl.txt

MD5 8e608af53f3b20186214a3d577a9e579
SHA1 3726f3cfa8c6a33d85446a539972710e25b3556f
SHA256 93c57cf76270b2abc940d818cd3e1628de67ab2dc9a261f36efe56bd0a6a3892
SHA512 be060e66925ed2427e5d743c10505c32fb6505f5337ac83c93596b4b772c4bb13dff5bc10ddd991d380c4251935d9b2ffb0249d4188beb481b9b2559374d6080

/data/data/com.singreal1/kl.txt

MD5 49dcf4acad90132afd8ce4b25c3510d3
SHA1 06a21cabed991990bbd1150e5aa535933babf169
SHA256 b21fd2308e9bd71e046a3c2234e1cfe03d7b72d2ecf5e872c6656a1709030d10
SHA512 f026631192277ffbb7f0a441f500d36bc92d5567ef1750ce9963602da7301cfd3f7e6098819d76de6f8386752993df5df779766e32167172c1dec17429977755

/data/data/com.singreal1/cache/oat/hjienb.cur.prof

MD5 ac74c6ff1e2f7dac41c3132d64ae8825
SHA1 8b94b46ccba147cbbc1ab0f02a89e653c8599643
SHA256 3ecf4af7e662ee13bc383dff9efe236e20718d23d57da8c668876755bf2abbc9
SHA512 97ff70175463d3e8df9c510d5f7080d3d71e3cea953c967a449d47d9afc1a76bf7813eef83b455b683a19104bff4c8071bedda7e3a7259346834c1028bd643fb

/data/data/com.singreal1/.qcom.singreal1

MD5 046a414913add6f5bb60072c7db819b6
SHA1 451ee4f6809260aec622d772fd329c7d0297a842
SHA256 b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA512 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-19 22:03

Reported

2024-02-19 22:20

Platform

android-33-x64-arm64-20231215-en

Max time kernel

155s

Max time network

136s

Command Line

com.singreal1

Signatures

Octo

banker trojan infostealer rat octo

Octo payload

Description Indicator Process Target
N/A N/A N/A N/A

Makes use of the framework's Accessibility service

Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker
Description Indicator Process Target
Framework service call android.content.pm.IPackageManager.getInstalledApplications N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.singreal1/cache/hjienb N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.singreal1

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.179.228:443 udp
GB 142.250.179.228:443 tcp
US 1.1.1.1:53 asamanaproductioneditiontsma.net udp
US 1.1.1.1:53 asamanaproductioneditionalsk.com udp
US 1.1.1.1:53 www.ip-api.com udp
US 208.95.112.1:80 www.ip-api.com tcp
RU 91.240.118.224:443 91.240.118.224 tcp
US 1.1.1.1:53 asamanaproductioneditiontols.com udp
US 1.1.1.1:53 asamanaproductioneditionksla.net udp
US 1.1.1.1:53 asamanaproductioneditionpskl.net udp
US 1.1.1.1:53 asamanaproductioneditionkdna.net udp
US 1.1.1.1:53 asamanaproductioneditionctfm.com udp
RU 91.240.118.224:443 91.240.118.224 tcp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp
RU 91.240.118.224:443 91.240.118.224 tcp
RU 91.240.118.224:443 91.240.118.224 tcp
US 1.1.1.1:53 remoteprovisioning.googleapis.com udp
US 1.1.1.1:53 udp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 172.217.169.4:443 tcp
GB 172.217.169.4:443 tcp
RU 91.240.118.224:443 91.240.118.224 tcp
RU 91.240.118.224:443 91.240.118.224 tcp
US 162.159.61.3:443 tcp
US 162.159.61.3:443 tcp
GB 142.250.187.227:443 tcp
US 162.159.61.3:443 udp
GB 142.250.187.227:443 udp
RU 91.240.118.224:443 91.240.118.224 tcp
RU 91.240.118.224:443 91.240.118.224 tcp
GB 142.250.179.228:443 udp
RU 91.240.118.224:443 91.240.118.224 tcp
RU 91.240.118.224:443 91.240.118.224 tcp

Files

/data/user/0/com.singreal1/cache/hjienb

MD5 97070dd36f79ad5c209abb2cf5171a1c
SHA1 ac99fff03b15d9429a08fd53a16a3b467b2619a5
SHA256 96c5fe7c50e98f015de4c144498b6b0adcd26fb919e57bc4bf79ae5d395ee59b
SHA512 caffe0fdbb34dd532cd9e02f0875b5ff3be547a168e6b69356edad2fb019fff496d41b988851c61ada2b069ef2b89e934c41d79bde1a13d596a44847849f4ddf

/data/user/0/com.singreal1/kl.txt

MD5 a047679045cc6666ad28f215b0f0f5e8
SHA1 375316a19530c8128338734cf017a827b476f064
SHA256 fc24d39fdb9a9ad9fe7776670c4e807178c502d1508bae69ebedf8c2b73c7e09
SHA512 d8a897b90c11eda7439a9c09f6a6c8dca1270e4985220aa347470b21ce24007a303528f8f9d42a462b25580fffdd9eb70653554d429a6ada02120c8dfc13c87f

/data/user/0/com.singreal1/kl.txt

MD5 d658ea8bd5abff00162e6d6fa6f90a45
SHA1 a9b85bce3ba9f7f815550ade00b438b85990d4ed
SHA256 bb9bae504512689b796a8e85dbbbc24de55ff923c70b26d8345b8541c8a88914
SHA512 d96bd72ad77b6dc0a0efe65542414d37e192eabfe65372b3fb646a40fe7dd0309c598622326f429878e76dd9c86c36be3191ec425fc4a13daa1b62df92f02578

/data/user/0/com.singreal1/kl.txt

MD5 257c600a594d7f3bd32bcc3cbfd5e46f
SHA1 6f9969d624b406914d3e97c64993bdb54e01823d
SHA256 d871b2caaf913eeb23c9712ebf6d8411d501a614e8e3da75d25f6c9a4d24746a
SHA512 b863498476e182b5318b6827ced3239a93da36457f0198446e6e438523a5b5bbdacdcc7ad80d19cfe2c936b5193c52394c50a246b47fd1d6238a0fc7090e69d5

/data/user/0/com.singreal1/kl.txt

MD5 5cab6d3362dd572b981a38fec5ea6850
SHA1 b3410350a21eee1461508291c5fac28e7322d6bc
SHA256 fdac9cbd26909972145610fc5c365a87ccab43e488d7d04152080f7ce7a0eb0e
SHA512 29380e5a4c347cbad384252e6ca9b6f583569c2e961a3bb07ea94c1eea1cabea4440a01d039709c7e5895414131d8cf4782e973781d95208bef04db0182970fe

/data/user/0/com.singreal1/kl.txt

MD5 0329a1ad00888d370e55417bf4ddd09d
SHA1 e13ad8185f9887fbd5e7e31d7603e6cbbfb17d4a
SHA256 e2737698588414690047e118821fc5aeceb5c399d325eebd50c119631168f291
SHA512 c3e4da6c08f863d32e1a6efe191bef345898c67016cae1f0f1a46a6dca253352dec569b3394edb87281b768457c8a2df5665a76c270b0ecee4666f6313327aef

/data/user/0/com.singreal1/kl.txt

MD5 2ebf9a826d2d16898da160fa2ffa54ae
SHA1 841ec10aa6fe1c10c6fe579ac012101b97b48e11
SHA256 c1a48bd48fa09a6f4ae13e47f9f403c5b8887ad755543e5bc0711419bdc6391a
SHA512 14cecb6de535037e537fa03b9a973e0aebd3dc7eb5f8b34a3ca0886394afd858e049415c73a3f9bbb1ccc2f5d692cbaf8bfdde6ba1baf35f785c5284b412b6bd

/data/user/0/com.singreal1/kl.txt

MD5 3845b6e094fb38e82f34869d68e3be52
SHA1 923e8dda777ba84bf99137f40e13500c75eb67ac
SHA256 fa97cc1e6fd002988662167bec7b8d30b0313023adc42ab6188a82af49e9044f
SHA512 4de9504f3907a478a3db79afed8b3de01c6f84148d2f88398d44663b2a64e9051164e1216d655fd232cb19557893ba190be761ede20ba4ffd0e14418da7a467f

/data/user/0/com.singreal1/kl.txt

MD5 b2ee3cb4d48afb5e5323358c75f3e95b
SHA1 0276844a7725dbfd3e41e3d2c354def4649ecc62
SHA256 5481b6457348bd369227d7394f1f9d0d5de0f60608d25010874ac5376e51c8a1
SHA512 3178f732c2e96e47f051d4615dda0af1d6d59f9222fe82bf132a2bfb16ce2b372f7bff5d58e7d0e30a108e4fe6587ad0beb8dbb0d49f69e3439429f5d9cee35e

/data/user/0/com.singreal1/kl.txt

MD5 4770d808f6704e3bae990079936b33a3
SHA1 f28e66519650d1387c982af914e41802883ec75c
SHA256 5d5df82167223cea862337a7eba32f197da4d0efafa66b6ea391f190d8c17344
SHA512 088a7aba32b9203a5e7c7ce35775fac64234ab65875ea113943f667fb40c4d7bcab0ced3c1731fd6e4afca747dfe506bec00f199ce9c76861442873299e0db99

/data/user/0/com.singreal1/kl.txt

MD5 f438fdaf3f6bd5de2c59c5a8546118f9
SHA1 34d6f37914e3fd8a120f3bfce767be460319568c
SHA256 331c1bc23680c9faf8d61c728fe08200a1f10e9d939714affd4bc75626342d4f
SHA512 dc60595b2907748c82b7f797f89d0f922ed3a1202e3a5fec9e30b105780aaaa08a9c4c8c63c848bcf07525be508dbfddb2a6c090fb1c5687ac47cac62552c06a

/data/user/0/com.singreal1/kl.txt

MD5 8bd23aef612aed9e881088b9a192c9db
SHA1 10bea3980357a204f27a40ee53a4ee079f928abc
SHA256 c686e1baca810e5c8129d8bb324e8ffbd23cbc92b505be9839716a459516f5d4
SHA512 def3d7f5667471e723fbdf21b4c9ac9733b603103379900c2d90051510a0b61d422ca8218054042eb3035d37bbc27dcf996f3ddc19cb3126e06181bda7356f08

/data/user/0/com.singreal1/kl.txt

MD5 dfc27dfb9a3dfe1349b6d2940844617d
SHA1 2f736fe8fc1a5d6f83fc36fba9c7c7d1e37f37cb
SHA256 7babc79ad6f802018377f0ebc9f05d18b3ac11a33266e9abbf7f3bfc21ff9bbe
SHA512 493ec36f977c08993d27232e215a9b53b223ee85be9f6bfef9222cce6e8251803518e8d9798c2b276fcff4131172fdc994d82b3521c343b1ecc33f3daae9667d

/data/user/0/com.singreal1/kl.txt

MD5 647342fe58057ef38ac1a29f1fdd2167
SHA1 4ba6b484bb1fdb08c171186f98598fbd81e5e41a
SHA256 9648da74b5213c1c9ef01374dea0bb2467feeb996a76ef1a77d0642488143258
SHA512 18941adf01a81f1875dc086529081a20a8ba8eab696b99821ffdbc08f10aaa54123f8c3fa3ea7a458d83390445d678e88ebd464114cd3029dc1fb2dde56dba4f

/data/user/0/com.singreal1/kl.txt

MD5 b54b91a4d9cdca4f234a952c854f9888
SHA1 b6f7c074030644bd1b07e7373ff2b4136914fc09
SHA256 6570dbf1e457d1fde2687b4c86a3b2fef4a45861092e2fa344132b52396fd000
SHA512 6b8ec6f52e54dca8bda554c0e866fc5d2522d5d2d991e37f28b52960ecb1f384ac717a31bb55ec30358ca010fff852f1d53127d771e75e735dc6e59108a76631

/data/user/0/com.singreal1/kl.txt

MD5 db74d48a022d37934118bd2bc1c9a600
SHA1 1fe7122785c671f0eb81b696a4c6b3d34d8b63ca
SHA256 45065234b5bfa3ce0468673961561e5a235f8324122272f1a2cc09d62f63f0c0
SHA512 b2e74665b8471a5e8838ef60e454022af34bf670eb2b8648c2a356e1f60976f10081737a3d1df2b336af89116c8a6f19aa0eb19a52fd94de5bb075bfb851f416

/data/user/0/com.singreal1/kl.txt

MD5 71554fcbf98d9974f0795ef21066e026
SHA1 46d7e4ee09db6a3bac48bbb598dc7aab4cf980c6
SHA256 e8fcd79ef8abd831a2835cf53ab69c0ac190733e0a3db49bfe25d0afaeb34af4
SHA512 91db718a26632bda4a599460d30cc5afee0c9cf2ad7bc7cefe52036aa8578a0bd6c2a382d6204349fe3195f64dc92dbe2774bdca75c33c9eb9f2b5d7c9aabcda

/data/user/0/com.singreal1/kl.txt

MD5 d015c8c9f1af4249c6b5872c910796a4
SHA1 1c04e635acd5e2422112b331c68aca7b6297d40f
SHA256 e8e80b30f184b6fe3768a3f368c3ba1262de18366e75dcddaae624f46e371e50
SHA512 935d7b704512c7e800a92bc21767cd6630f74a942cbb75b4eb90cbf52d8558f2e5686de45bc5a2a8c2b35a3785c9dcf59c57e03e2eafc0e6660a99054f0098a1

/data/user/0/com.singreal1/cache/oat/hjienb.cur.prof

MD5 cc912789c105ba590d712a237001c3ae
SHA1 0f3ae6709b86a57e4bada0447d15ef589d11d325
SHA256 c6c55f0cabe9283613a40c288227d15e9d0cac2aa674018c43790f13590ec66d
SHA512 f94414e3ed526461f388c794b55de1d3743b81162b9eb831bedc89c2d6e3a92924b206f84f99f0d15d40474b69e93a287c5d7cf60bf4424d28351fa1f2ae92aa

/data/user/0/com.singreal1/.qcom.singreal1

MD5 046a414913add6f5bb60072c7db819b6
SHA1 451ee4f6809260aec622d772fd329c7d0297a842
SHA256 b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA512 4e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c