General
-
Target
c1d3a087d85cc5135b467defddb01840559b4968c064d9d650a278b1a26a977b.apk
-
Size
18.3MB
-
Sample
240902-jx6rfaxaje
-
MD5
3eb1dc7df4a168972ed191fc9e16b0e5
-
SHA1
78edcfb4e0abb8d1a35bec23f4465e105a7dda04
-
SHA256
c1d3a087d85cc5135b467defddb01840559b4968c064d9d650a278b1a26a977b
-
SHA512
955fb12fb30f9fa018c9a173665765e41a619515568e9956c9f239bb9973f77b4c7c6ea1191eb9d991357a31955bc39426879694d3fb2b9ab13505979b47b7a6
-
SSDEEP
393216:cXWFC6u5xX+fOAjtX1vJRerck8eTFMy+RWP2ZBm9PILcAfgq2fzgBS:NPuubjzvOrcVhRWP2ZcCgDfzt
Behavioral task
behavioral1
Sample
c1d3a087d85cc5135b467defddb01840559b4968c064d9d650a278b1a26a977b.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
c1d3a087d85cc5135b467defddb01840559b4968c064d9d650a278b1a26a977b.apk
-
Size
18.3MB
-
MD5
3eb1dc7df4a168972ed191fc9e16b0e5
-
SHA1
78edcfb4e0abb8d1a35bec23f4465e105a7dda04
-
SHA256
c1d3a087d85cc5135b467defddb01840559b4968c064d9d650a278b1a26a977b
-
SHA512
955fb12fb30f9fa018c9a173665765e41a619515568e9956c9f239bb9973f77b4c7c6ea1191eb9d991357a31955bc39426879694d3fb2b9ab13505979b47b7a6
-
SSDEEP
393216:cXWFC6u5xX+fOAjtX1vJRerck8eTFMy+RWP2ZBm9PILcAfgq2fzgBS:NPuubjzvOrcVhRWP2ZcCgDfzt
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-