General
-
Target
6a37987315b27f16f16915bfb451c44a0f6470c4d0654082e4643f41d125fa12
-
Size
13.8MB
-
Sample
240404-p1ep1sga8v
-
MD5
f29e6ec4603356f313a30879455ca758
-
SHA1
305f6865daceef5f150679b76f969c1c3970314f
-
SHA256
6a37987315b27f16f16915bfb451c44a0f6470c4d0654082e4643f41d125fa12
-
SHA512
ed109f4480d9fc9758ea424c750bfc78fa234b1a2794714fec51f2c7a467537e599c594d9870194aeb693f17a23889675e8e895de0ef7b0a8c0b37c67a5fa080
-
SSDEEP
393216:h4/vdvWvIfLoJ0+2o8j5D5i5jK8sCOx9WXPNTKtU:y1vGOU+XjtSjKXGpK6
Static task
static1
Behavioral task
behavioral1
Sample
6a37987315b27f16f16915bfb451c44a0f6470c4d0654082e4643f41d125fa12.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
6a37987315b27f16f16915bfb451c44a0f6470c4d0654082e4643f41d125fa12
-
Size
13.8MB
-
MD5
f29e6ec4603356f313a30879455ca758
-
SHA1
305f6865daceef5f150679b76f969c1c3970314f
-
SHA256
6a37987315b27f16f16915bfb451c44a0f6470c4d0654082e4643f41d125fa12
-
SHA512
ed109f4480d9fc9758ea424c750bfc78fa234b1a2794714fec51f2c7a467537e599c594d9870194aeb693f17a23889675e8e895de0ef7b0a8c0b37c67a5fa080
-
SSDEEP
393216:h4/vdvWvIfLoJ0+2o8j5D5i5jK8sCOx9WXPNTKtU:y1vGOU+XjtSjKXGpK6
Score7/10-
Checks Android system properties for emulator presence.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-