General
-
Target
14769ba60b028f1326d896e1186e346a549c9e2e778e1b25c25e77b0e5f66183
-
Size
11.4MB
-
Sample
240404-pxw5wsfh5z
-
MD5
59e33709770511ff6172fd50a37ec22b
-
SHA1
a6efd3085e385d1075eeef1ad8f669f890af5039
-
SHA256
14769ba60b028f1326d896e1186e346a549c9e2e778e1b25c25e77b0e5f66183
-
SHA512
2b31d2958b805d6319fce2497997bdc2e35f01ec57e47670bc4298dbc4522a2b7b153d2bb2a8390de731366e68f248b577c5a58de47c391d06c5b6a7da44d1a1
-
SSDEEP
196608:a+DsCfNMpeRjO3ASbzpLclK+3VJnLQnbkazMD2bm0WArhzALFwvUcxn8S:tsCfNo3A8zpeDldcbdrq0nYFMUxS
Behavioral task
behavioral1
Sample
14769ba60b028f1326d896e1186e346a549c9e2e778e1b25c25e77b0e5f66183.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
14769ba60b028f1326d896e1186e346a549c9e2e778e1b25c25e77b0e5f66183
-
Size
11.4MB
-
MD5
59e33709770511ff6172fd50a37ec22b
-
SHA1
a6efd3085e385d1075eeef1ad8f669f890af5039
-
SHA256
14769ba60b028f1326d896e1186e346a549c9e2e778e1b25c25e77b0e5f66183
-
SHA512
2b31d2958b805d6319fce2497997bdc2e35f01ec57e47670bc4298dbc4522a2b7b153d2bb2a8390de731366e68f248b577c5a58de47c391d06c5b6a7da44d1a1
-
SSDEEP
196608:a+DsCfNMpeRjO3ASbzpLclK+3VJnLQnbkazMD2bm0WArhzALFwvUcxn8S:tsCfNo3A8zpeDldcbdrq0nYFMUxS
Score7/10-
Checks Android system properties for emulator presence.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-