General
-
Target
32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5.apk
-
Size
10.1MB
-
Sample
240319-cnhjxsef42
-
MD5
20510fb9fdcf0a6657a79805eca2b681
-
SHA1
4c0163d7e6cdcf50c76aad1be16e08c0625c7d19
-
SHA256
32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5
-
SHA512
8c6ae9c94c68adf02148a070a6a4aa5e7b3e86504e61a16d7d1f90c4f99a136ee1d024e184f803967c4a3ee9c7faa3ac35c6ab8af491ac79bfcc711f74f84422
-
SSDEEP
196608:1QPrDHA4VPNNtWiYIfNyjRwxySOB4cmFICAZMjL/BrvA6rA3h6v4SkjKCQ7S:1QPP1PRNyt9BcFIC0M26rA3Q1E
Static task
static1
Behavioral task
behavioral1
Sample
32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5.apk
-
Size
10.1MB
-
MD5
20510fb9fdcf0a6657a79805eca2b681
-
SHA1
4c0163d7e6cdcf50c76aad1be16e08c0625c7d19
-
SHA256
32af2b4809ac5560874ca1cf635efcc83afa1c33506aa9566e2b426645f224a5
-
SHA512
8c6ae9c94c68adf02148a070a6a4aa5e7b3e86504e61a16d7d1f90c4f99a136ee1d024e184f803967c4a3ee9c7faa3ac35c6ab8af491ac79bfcc711f74f84422
-
SSDEEP
196608:1QPrDHA4VPNNtWiYIfNyjRwxySOB4cmFICAZMjL/BrvA6rA3h6v4SkjKCQ7S:1QPP1PRNyt9BcFIC0M26rA3Q1E
-
Acquires the wake lock
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-