General
-
Target
9c050b67f78d8b62de46bbb2c5839e32.bin
-
Size
29.9MB
-
Sample
240612-cp2n7ayemc
-
MD5
9c050b67f78d8b62de46bbb2c5839e32
-
SHA1
1f949e9ea47499242fbb83ff329607b5dbb421be
-
SHA256
17beaf1d525aaac16b5ecd6c773189a2dfa28a5cd4a13af9a203528290425f0d
-
SHA512
084d289caeb3301879a935540b0f3a2791c8ae2399e0d9cba63b915045b92f8642ad472cb47d00d76643d1ac8bc18492c62384e7f1de4dfe92311dbb47e557ff
-
SSDEEP
786432:p12fU6EcFtiUc+OxD90+ynm6ypVtQQAnWfzNgqmmN:p1286BF03bxJy/0tqYfN
Static task
static1
Behavioral task
behavioral1
Sample
9c050b67f78d8b62de46bbb2c5839e32.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
9c050b67f78d8b62de46bbb2c5839e32.bin
-
Size
29.9MB
-
MD5
9c050b67f78d8b62de46bbb2c5839e32
-
SHA1
1f949e9ea47499242fbb83ff329607b5dbb421be
-
SHA256
17beaf1d525aaac16b5ecd6c773189a2dfa28a5cd4a13af9a203528290425f0d
-
SHA512
084d289caeb3301879a935540b0f3a2791c8ae2399e0d9cba63b915045b92f8642ad472cb47d00d76643d1ac8bc18492c62384e7f1de4dfe92311dbb47e557ff
-
SSDEEP
786432:p12fU6EcFtiUc+OxD90+ynm6ypVtQQAnWfzNgqmmN:p1286BF03bxJy/0tqYfN
Score7/10-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
3System Checks
3