General
-
Target
f44630788c304e096e9bf5eb4f46364c1175202777878b8f9cbb6a4611ce90f6.bin
-
Size
3.7MB
-
Sample
241224-1z6ynaypar
-
MD5
e98ecefca85d786304eb9d01fca542d8
-
SHA1
1da2290fee305ea62cb6571090275071b8960e37
-
SHA256
f44630788c304e096e9bf5eb4f46364c1175202777878b8f9cbb6a4611ce90f6
-
SHA512
47d95bdbb189641c4fdb33865be5bf00af75c9947e9b58ea30bf3d7b26eca36c5428fa2217f19371e74d5f92b45c35006df62f86064e5df539b8930b0be19b41
-
SSDEEP
98304:WF1y8VrJ8OEEQx60BLEA26c5/i/ro4mFb7LNcjFk:Gy8V98KQE0BLEAAK/k4ubHNcRk
Behavioral task
behavioral1
Sample
f44630788c304e096e9bf5eb4f46364c1175202777878b8f9cbb6a4611ce90f6.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
f44630788c304e096e9bf5eb4f46364c1175202777878b8f9cbb6a4611ce90f6.bin
-
Size
3.7MB
-
MD5
e98ecefca85d786304eb9d01fca542d8
-
SHA1
1da2290fee305ea62cb6571090275071b8960e37
-
SHA256
f44630788c304e096e9bf5eb4f46364c1175202777878b8f9cbb6a4611ce90f6
-
SHA512
47d95bdbb189641c4fdb33865be5bf00af75c9947e9b58ea30bf3d7b26eca36c5428fa2217f19371e74d5f92b45c35006df62f86064e5df539b8930b0be19b41
-
SSDEEP
98304:WF1y8VrJ8OEEQx60BLEA26c5/i/ro4mFb7LNcjFk:Gy8V98KQE0BLEAAK/k4ubHNcRk
Score7/10-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
1System Network Configuration Discovery
1