General
-
Target
1756c42d2dc836ec27015e29fbc904b4e9811f1e33284093e4103079a2c70888.bin
-
Size
3.7MB
-
Sample
241225-138lnazngj
-
MD5
64faa516ddb07d896b0b57e8b02938c8
-
SHA1
e9fd625d3a843ae938dd99cae6b58f4a56442cc6
-
SHA256
1756c42d2dc836ec27015e29fbc904b4e9811f1e33284093e4103079a2c70888
-
SHA512
af185b45cf54448ba7a1255c59a7c26bf54d2f544add90b9e11075a9e05749c59c0b07cffc99542c9b1dd732f1a8164ae539e0e14784b2244eddfbb5ea55367c
-
SSDEEP
98304:LM1y8VlJtJD4UAVzC1oUuylSxEaLj5pLNcsCz6:ky8V3zMU8cFuf+S5xNcse6
Behavioral task
behavioral1
Sample
1756c42d2dc836ec27015e29fbc904b4e9811f1e33284093e4103079a2c70888.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
1756c42d2dc836ec27015e29fbc904b4e9811f1e33284093e4103079a2c70888.bin
-
Size
3.7MB
-
MD5
64faa516ddb07d896b0b57e8b02938c8
-
SHA1
e9fd625d3a843ae938dd99cae6b58f4a56442cc6
-
SHA256
1756c42d2dc836ec27015e29fbc904b4e9811f1e33284093e4103079a2c70888
-
SHA512
af185b45cf54448ba7a1255c59a7c26bf54d2f544add90b9e11075a9e05749c59c0b07cffc99542c9b1dd732f1a8164ae539e0e14784b2244eddfbb5ea55367c
-
SSDEEP
98304:LM1y8VlJtJD4UAVzC1oUuylSxEaLj5pLNcsCz6:ky8V3zMU8cFuf+S5xNcse6
Score7/10-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
1System Network Configuration Discovery
1