General
-
Target
PelisMax1102.apk
-
Size
54.8MB
-
Sample
240823-a35lwsyfln
-
MD5
d8e86bda666f958cf2048a366c70eb12
-
SHA1
ef518dff3fdc5d46d8be26c22c9c0a759d338556
-
SHA256
2a082a251186f073265791338799ad0e1eec0c3f4fd3b8a911bc5ec34538cf9a
-
SHA512
6b8b6b1119e082a4dc6b981287b4d53dd2570011a072b46790a008a0b6417b5393a89813ff70b129ec1c452d90c465fb7de3c8ca3db75e3a728e65337d4bc0b9
-
SSDEEP
786432:ts6B1FnNxWDKGvQm/1uYD5bi1b84H7UpbFlds6lOQ8is3iycHF0To3FHVYcJJXIN:i6BvnNkD0dYdilsbdI3VcmTo3ccJVIN
Behavioral task
behavioral1
Sample
PelisMax1102.apk
Resource
android-x64-arm64-20240624-es
Malware Config
Targets
-
-
Target
PelisMax1102.apk
-
Size
54.8MB
-
MD5
d8e86bda666f958cf2048a366c70eb12
-
SHA1
ef518dff3fdc5d46d8be26c22c9c0a759d338556
-
SHA256
2a082a251186f073265791338799ad0e1eec0c3f4fd3b8a911bc5ec34538cf9a
-
SHA512
6b8b6b1119e082a4dc6b981287b4d53dd2570011a072b46790a008a0b6417b5393a89813ff70b129ec1c452d90c465fb7de3c8ca3db75e3a728e65337d4bc0b9
-
SSDEEP
786432:ts6B1FnNxWDKGvQm/1uYD5bi1b84H7UpbFlds6lOQ8is3iycHF0To3FHVYcJJXIN:i6BvnNkD0dYdilsbdI3VcmTo3ccJVIN
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-