General
-
Target
cdd88041961467c1bae7b167953694511270269b7d8b1cbcae445aafffef4e37
-
Size
11.8MB
-
Sample
240416-l7wekaff69
-
MD5
7e58274d23ebaca3f9ce6da7d2b7a8ae
-
SHA1
ccc078c929d3628188c4cc5a2bd9862c368b7fda
-
SHA256
cdd88041961467c1bae7b167953694511270269b7d8b1cbcae445aafffef4e37
-
SHA512
c0b750b16cbcaf2c18d68cd516e0ba02d4d2bc0875ccad6981ce0af2f1b7ed6129bfee9aabf45f02c002a1b50c342b27891bb81f80b8e569ecd1553d3cee9918
-
SSDEEP
196608:KlkjdqPLQ4vs40WHNVXlVvjq8Tky5Q7NMpeRjO3A+DsCkhYWycvJrgRYqNVg:K3PLQ4vkClVG8TkkINo33sCkmWycvJrl
Static task
static1
Behavioral task
behavioral1
Sample
cdd88041961467c1bae7b167953694511270269b7d8b1cbcae445aafffef4e37.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
cdd88041961467c1bae7b167953694511270269b7d8b1cbcae445aafffef4e37
-
Size
11.8MB
-
MD5
7e58274d23ebaca3f9ce6da7d2b7a8ae
-
SHA1
ccc078c929d3628188c4cc5a2bd9862c368b7fda
-
SHA256
cdd88041961467c1bae7b167953694511270269b7d8b1cbcae445aafffef4e37
-
SHA512
c0b750b16cbcaf2c18d68cd516e0ba02d4d2bc0875ccad6981ce0af2f1b7ed6129bfee9aabf45f02c002a1b50c342b27891bb81f80b8e569ecd1553d3cee9918
-
SSDEEP
196608:KlkjdqPLQ4vs40WHNVXlVvjq8Tky5Q7NMpeRjO3A+DsCkhYWycvJrgRYqNVg:K3PLQ4vkClVG8TkkINo33sCkmWycvJrl
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about running processes on the device.
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads information about phone network operator.
-