General
-
Target
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8
-
Size
21.4MB
-
Sample
240908-ajrwpawaqa
-
MD5
b9670781a6220f5db33c9dbd6c25238d
-
SHA1
d7b5125f47ffadc06b6e27ea900fa0dfa1f1cc6b
-
SHA256
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8
-
SHA512
a18f1c5b326b8bab3df03a474e77c27414aea61e04f123651e4d1981bce1a39619f9954190b70ac1ac7eecffb09fbe60083c061b3bc66811890dc6582382a993
-
SSDEEP
393216:KD51hYo9wYYoIPH9Sg/2BUozTNR4pgka1SiDded0vQ5ofh5B:KF1h3aY/IPdSg/2BUozzSicd0vQ5M5B
Behavioral task
behavioral1
Sample
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8.apk
Resource
android-x64-20240910-en
Malware Config
Targets
-
-
Target
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8
-
Size
21.4MB
-
MD5
b9670781a6220f5db33c9dbd6c25238d
-
SHA1
d7b5125f47ffadc06b6e27ea900fa0dfa1f1cc6b
-
SHA256
7e41cd654128fdab2606a0975d132dddf036320744615d39118ace060608e6a8
-
SHA512
a18f1c5b326b8bab3df03a474e77c27414aea61e04f123651e4d1981bce1a39619f9954190b70ac1ac7eecffb09fbe60083c061b3bc66811890dc6582382a993
-
SSDEEP
393216:KD51hYo9wYYoIPH9Sg/2BUozTNR4pgka1SiDded0vQ5ofh5B:KF1h3aY/IPdSg/2BUozzSicd0vQ5M5B
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-