General
-
Target
049f57ed5150fb639ea1714cba3dc12f1bc6b248ef31e5a610bd65bc87991ab8
-
Size
13.7MB
-
Sample
240416-mbst8shg51
-
MD5
1ac6ab6dce7b85bcaebaea0b659a4758
-
SHA1
cab07fb3bb8a625b69bdce725f68d5667aa183b7
-
SHA256
049f57ed5150fb639ea1714cba3dc12f1bc6b248ef31e5a610bd65bc87991ab8
-
SHA512
d99804456a4382d7b6b759cc683c9685613aa4f6b420c33bbc7c3ddf4d0a4ec3d770dd927b9b7acad11373f01a26a98321628ff54e2ca210a386b61765ab652a
-
SSDEEP
393216:rSTYCaI+XnaDypqp6rJsCrNo39EIY8rQ2L8:rMYLI+XaDysom6E9EakK8
Behavioral task
behavioral1
Sample
049f57ed5150fb639ea1714cba3dc12f1bc6b248ef31e5a610bd65bc87991ab8.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
049f57ed5150fb639ea1714cba3dc12f1bc6b248ef31e5a610bd65bc87991ab8
-
Size
13.7MB
-
MD5
1ac6ab6dce7b85bcaebaea0b659a4758
-
SHA1
cab07fb3bb8a625b69bdce725f68d5667aa183b7
-
SHA256
049f57ed5150fb639ea1714cba3dc12f1bc6b248ef31e5a610bd65bc87991ab8
-
SHA512
d99804456a4382d7b6b759cc683c9685613aa4f6b420c33bbc7c3ddf4d0a4ec3d770dd927b9b7acad11373f01a26a98321628ff54e2ca210a386b61765ab652a
-
SSDEEP
393216:rSTYCaI+XnaDypqp6rJsCrNo39EIY8rQ2L8:rMYLI+XaDysom6E9EakK8
Score7/10-
Checks Android system properties for emulator presence.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-