General
-
Target
42bd23110fbfde71be924a9bdb5a8381.apk
-
Size
10.0MB
-
Sample
240517-wzzr5acd7z
-
MD5
42bd23110fbfde71be924a9bdb5a8381
-
SHA1
4698b3aabae28ab66c8469853b4e2bbb28b52a8c
-
SHA256
345ec584960f85f0411b6756cca79607d1e90d77aa87819f2a95e61ad7043731
-
SHA512
612fddf62928d8cda96e05d8990f0c87cc1e809bc53298ea5361a63073ba4f74be30b37450e6c40fca5b9a5c55482ac98bf7db5330b6580cb16ee0453037f1de
-
SSDEEP
196608:uH8ej9ekpj0G54btQhB8ptxcF7BUxJHfcsJCqwD0/JMX9urOw:uH7jEPGWRKBUxBptwZX9u7
Static task
static1
Behavioral task
behavioral1
Sample
42bd23110fbfde71be924a9bdb5a8381.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
42bd23110fbfde71be924a9bdb5a8381.apk
Resource
android-x64-20240514-en
Malware Config
Targets
-
-
Target
42bd23110fbfde71be924a9bdb5a8381.apk
-
Size
10.0MB
-
MD5
42bd23110fbfde71be924a9bdb5a8381
-
SHA1
4698b3aabae28ab66c8469853b4e2bbb28b52a8c
-
SHA256
345ec584960f85f0411b6756cca79607d1e90d77aa87819f2a95e61ad7043731
-
SHA512
612fddf62928d8cda96e05d8990f0c87cc1e809bc53298ea5361a63073ba4f74be30b37450e6c40fca5b9a5c55482ac98bf7db5330b6580cb16ee0453037f1de
-
SSDEEP
196608:uH8ej9ekpj0G54btQhB8ptxcF7BUxJHfcsJCqwD0/JMX9urOw:uH7jEPGWRKBUxBptwZX9u7
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads the content of photos stored on the user's device.
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-