General
-
Target
6AF5B69AEC12654FD3F51D1DD3E8894810A6F6B52C57A1FED0F19A8E9C90CE57.apk
-
Size
25.5MB
-
Sample
240627-kh38fasbqg
-
MD5
03681e5b7df8cce66aafade215a0d99f
-
SHA1
8cc140a29794c9b36b41b2f1fc15058099647c67
-
SHA256
6af5b69aec12654fd3f51d1dd3e8894810a6f6b52c57a1fed0f19a8e9c90ce57
-
SHA512
39fca233953647293f5e0b7f479c4d3ca084e0e9bdf41c2b8edf5c0f5559920e0689480c9ba3f2a098af54aa1e8be1585bbccbf07aeca6573c24bbeeda20667e
-
SSDEEP
786432:Jqp0q8/YmmRPy9uCBAbOGDoYDszkXABTzVikn7xGwgcO:Jw0HFmA9up9DowRXABTpiw7wV
Static task
static1
Behavioral task
behavioral1
Sample
6AF5B69AEC12654FD3F51D1DD3E8894810A6F6B52C57A1FED0F19A8E9C90CE57.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
6AF5B69AEC12654FD3F51D1DD3E8894810A6F6B52C57A1FED0F19A8E9C90CE57.apk
-
Size
25.5MB
-
MD5
03681e5b7df8cce66aafade215a0d99f
-
SHA1
8cc140a29794c9b36b41b2f1fc15058099647c67
-
SHA256
6af5b69aec12654fd3f51d1dd3e8894810a6f6b52c57a1fed0f19a8e9c90ce57
-
SHA512
39fca233953647293f5e0b7f479c4d3ca084e0e9bdf41c2b8edf5c0f5559920e0689480c9ba3f2a098af54aa1e8be1585bbccbf07aeca6573c24bbeeda20667e
-
SSDEEP
786432:Jqp0q8/YmmRPy9uCBAbOGDoYDszkXABTzVikn7xGwgcO:Jw0HFmA9up9DowRXABTpiw7wV
Score8/10-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2