General
-
Target
5556b55607642a8fdb9aad076179c00ee51296e28fb140f5daa756a34ba6ae5a
-
Size
16.6MB
-
Sample
240404-pzc5ssgf35
-
MD5
e449f7cced6c77f0c11068429b53f7db
-
SHA1
d29578b35b7b222e0001cc2fda1b149b36f38d16
-
SHA256
5556b55607642a8fdb9aad076179c00ee51296e28fb140f5daa756a34ba6ae5a
-
SHA512
fdfe78792a3122e21af8a21f7e336973ab19e0d0b3b6098ce8f45d2bf94e712d6448a95b906e342bf6e0c9f126b841b7e1f365e218c4380df46d78285c860216
-
SSDEEP
393216:ut/4pCFQO1HtK08bu7OZbzLEGzmLqmXzhXMRBvkYEa:SQKQO1k08gOFLzE8qa
Static task
static1
Behavioral task
behavioral1
Sample
5556b55607642a8fdb9aad076179c00ee51296e28fb140f5daa756a34ba6ae5a.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
5556b55607642a8fdb9aad076179c00ee51296e28fb140f5daa756a34ba6ae5a
-
Size
16.6MB
-
MD5
e449f7cced6c77f0c11068429b53f7db
-
SHA1
d29578b35b7b222e0001cc2fda1b149b36f38d16
-
SHA256
5556b55607642a8fdb9aad076179c00ee51296e28fb140f5daa756a34ba6ae5a
-
SHA512
fdfe78792a3122e21af8a21f7e336973ab19e0d0b3b6098ce8f45d2bf94e712d6448a95b906e342bf6e0c9f126b841b7e1f365e218c4380df46d78285c860216
-
SSDEEP
393216:ut/4pCFQO1HtK08bu7OZbzLEGzmLqmXzhXMRBvkYEa:SQKQO1k08gOFLzE8qa
Score8/10-
Checks Android system properties for emulator presence.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-