General
-
Target
a996f06e7525c43b6e6e19d4186be3ae
-
Size
263KB
-
Sample
240227-tpjxtadf35
-
MD5
a996f06e7525c43b6e6e19d4186be3ae
-
SHA1
c3c5a46b9f7fc88609339774f25d419f4f6116ac
-
SHA256
420d5f544b73f52dba333c92601576f54b93be504bff774a745f2939d9453eb8
-
SHA512
a28124e151b0a72cec81dada5ac68a336a211f9356637537d5fc179822b72a75a24c6799fe5c335b006ca13054784c1580ed042567e27dd8af0d958ade48159c
-
SSDEEP
6144:DfUPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNK:Ci6tQIwsBFa/IvcR9UK
Static task
static1
Behavioral task
behavioral1
Sample
a996f06e7525c43b6e6e19d4186be3ae.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
a996f06e7525c43b6e6e19d4186be3ae.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
a996f06e7525c43b6e6e19d4186be3ae
-
Size
263KB
-
MD5
a996f06e7525c43b6e6e19d4186be3ae
-
SHA1
c3c5a46b9f7fc88609339774f25d419f4f6116ac
-
SHA256
420d5f544b73f52dba333c92601576f54b93be504bff774a745f2939d9453eb8
-
SHA512
a28124e151b0a72cec81dada5ac68a336a211f9356637537d5fc179822b72a75a24c6799fe5c335b006ca13054784c1580ed042567e27dd8af0d958ade48159c
-
SSDEEP
6144:DfUPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNK:Ci6tQIwsBFa/IvcR9UK
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-