General
-
Target
shrimp.paddle.merit.apk
-
Size
3.7MB
-
Sample
210511-xpcr2ddy3n
-
MD5
49e960105bd79e726d5e89824798712d
-
SHA1
b6d825471c3045d62e8548d66efb836716930147
-
SHA256
d778c50ddf8ccd41c7f9cdd913c38d90c7d0a59cb44e650068e671db6ce3e5ab
-
SHA512
14c547c15c2ab9adc09e6a352b4f6887196c3a64a42ca5e8b9cbac5957916201448df714d8cbdbfa803a626d9a099244bfb606354f30ad392ea47a9460d04d17
Static task
static1
Behavioral task
behavioral1
Sample
shrimp.paddle.merit.apk
Resource
android-x86_64
Malware Config
Extracted
teabot
http://lukabukazykasas.top:80/api/
http://lokaspitroaksi.top:80/api/
Targets
-
-
Target
shrimp.paddle.merit.apk
-
Size
3.7MB
-
MD5
49e960105bd79e726d5e89824798712d
-
SHA1
b6d825471c3045d62e8548d66efb836716930147
-
SHA256
d778c50ddf8ccd41c7f9cdd913c38d90c7d0a59cb44e650068e671db6ce3e5ab
-
SHA512
14c547c15c2ab9adc09e6a352b4f6887196c3a64a42ca5e8b9cbac5957916201448df714d8cbdbfa803a626d9a099244bfb606354f30ad392ea47a9460d04d17
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-