General
-
Target
9c024966062cb00b3dff281b4a92451e793b3436f7c0bb782d96ed9d2721f394
-
Size
9.4MB
-
Sample
240416-l44lrsfe33
-
MD5
e0140d7409d8ea55cb1f910e56ecb5c0
-
SHA1
be189a5e2dc84f27111114c5eb357bc02ff820dc
-
SHA256
9c024966062cb00b3dff281b4a92451e793b3436f7c0bb782d96ed9d2721f394
-
SHA512
e2e14be5f2f3539f3f54d66534b9d83f94cff1ad6100fcdee2dee7d9b70ff8251d48b44015e9bfd2ad5a382552322b32af5398824bcdf002b636cd03a7b37255
-
SSDEEP
196608:cB61MHXP+yV2GeNMpeRjO3O+DsCWR6FNfrjLbu/X0gR:cuOXP+U2GeNo3xsCWR6vfrvC/kI
Behavioral task
behavioral1
Sample
9c024966062cb00b3dff281b4a92451e793b3436f7c0bb782d96ed9d2721f394.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
9c024966062cb00b3dff281b4a92451e793b3436f7c0bb782d96ed9d2721f394
-
Size
9.4MB
-
MD5
e0140d7409d8ea55cb1f910e56ecb5c0
-
SHA1
be189a5e2dc84f27111114c5eb357bc02ff820dc
-
SHA256
9c024966062cb00b3dff281b4a92451e793b3436f7c0bb782d96ed9d2721f394
-
SHA512
e2e14be5f2f3539f3f54d66534b9d83f94cff1ad6100fcdee2dee7d9b70ff8251d48b44015e9bfd2ad5a382552322b32af5398824bcdf002b636cd03a7b37255
-
SSDEEP
196608:cB61MHXP+yV2GeNMpeRjO3O+DsCWR6FNfrjLbu/X0gR:cuOXP+U2GeNo3xsCWR6vfrvC/kI
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-