General
-
Target
56c4fc0c6d12acdac21d5f2e1140e10fbe15f54abe11c8fca9765afa3ed9f2d5
-
Size
10.8MB
-
Sample
240404-py47wsga2s
-
MD5
fa616996d4a0c3a1f2c7386a325951f1
-
SHA1
9291972c813ef1eaa9f631394a66c6b7dfc24601
-
SHA256
56c4fc0c6d12acdac21d5f2e1140e10fbe15f54abe11c8fca9765afa3ed9f2d5
-
SHA512
1feea52839fdacd89b27752e3a8c6706ad43f655c5a2b82f572c269b6926af7d647d947f9580d895a03e17399c1299a5fdd6a0d356047899e76c2749bb980f08
-
SSDEEP
196608:LOtdZllctE90ibCyCxJcpPNMpeRjO36+DsC/JlYx83OIopQGPX:LO5ctEZWOPNo3NsCBCiObpR/
Static task
static1
Behavioral task
behavioral1
Sample
56c4fc0c6d12acdac21d5f2e1140e10fbe15f54abe11c8fca9765afa3ed9f2d5.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
56c4fc0c6d12acdac21d5f2e1140e10fbe15f54abe11c8fca9765afa3ed9f2d5
-
Size
10.8MB
-
MD5
fa616996d4a0c3a1f2c7386a325951f1
-
SHA1
9291972c813ef1eaa9f631394a66c6b7dfc24601
-
SHA256
56c4fc0c6d12acdac21d5f2e1140e10fbe15f54abe11c8fca9765afa3ed9f2d5
-
SHA512
1feea52839fdacd89b27752e3a8c6706ad43f655c5a2b82f572c269b6926af7d647d947f9580d895a03e17399c1299a5fdd6a0d356047899e76c2749bb980f08
-
SSDEEP
196608:LOtdZllctE90ibCyCxJcpPNMpeRjO36+DsC/JlYx83OIopQGPX:LO5ctEZWOPNo3NsCBCiObpR/
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-