General
-
Target
b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1
-
Size
83.2MB
-
Sample
240819-yswg8sxcmm
-
MD5
878a54d1ef12aa574bf1e2ac68a61d29
-
SHA1
c61fc2f7755f85b6d241ec9a85f40e4a3f995568
-
SHA256
b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1
-
SHA512
96f914406d452cce346d9a390b55d00c9d44e250ca13beae66e0ba7b34829772c0186708ebac05d5db13f01d1d0c54e1be7ddf6f5569cf64b8ef992a221b496b
-
SSDEEP
1572864:WekFHxdlDZyIiAIbp3WX3GM80lzV/lldUYBFUW5ukbh:OHxdTW30VPldUYBFVl
Behavioral task
behavioral1
Sample
b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1
-
Size
83.2MB
-
MD5
878a54d1ef12aa574bf1e2ac68a61d29
-
SHA1
c61fc2f7755f85b6d241ec9a85f40e4a3f995568
-
SHA256
b1393abba572df6e4c5bf45a135b9187b2efcaf67018ccc84d6a2ade4c25aab1
-
SHA512
96f914406d452cce346d9a390b55d00c9d44e250ca13beae66e0ba7b34829772c0186708ebac05d5db13f01d1d0c54e1be7ddf6f5569cf64b8ef992a221b496b
-
SSDEEP
1572864:WekFHxdlDZyIiAIbp3WX3GM80lzV/lldUYBFUW5ukbh:OHxdTW30VPldUYBFVl
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-