General
-
Target
DEV_YERLİ_PORNO_ARSİVİ.apk
-
Size
3.9MB
-
Sample
210725-7hzj93av3n
-
MD5
b82c32069c0a7bc7d8c01aca3d886558
-
SHA1
076bba36db9a370f1b578ab9e28e993eabc74a30
-
SHA256
eeb5699423902d7422482cbbe30a025180155edb3aaeb625446e403c46f944f3
-
SHA512
1c68f0edd814b982f844fe6723dcad604b6219abdcba84d010b45fb1bf199d893d19c8e98dce3821f30bda44d37174af0b7c42d170618b3a44d6acab586a0b71
Static task
static1
Behavioral task
behavioral1
Sample
DEV_YERLİ_PORNO_ARSİVİ.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
DEV_YERLİ_PORNO_ARSİVİ.apk
Resource
android-x64-arm64
Behavioral task
behavioral3
Sample
DEV_YERLİ_PORNO_ARSİVİ.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
DEV_YERLİ_PORNO_ARSİVİ.apk
-
Size
3.9MB
-
MD5
b82c32069c0a7bc7d8c01aca3d886558
-
SHA1
076bba36db9a370f1b578ab9e28e993eabc74a30
-
SHA256
eeb5699423902d7422482cbbe30a025180155edb3aaeb625446e403c46f944f3
-
SHA512
1c68f0edd814b982f844fe6723dcad604b6219abdcba84d010b45fb1bf199d893d19c8e98dce3821f30bda44d37174af0b7c42d170618b3a44d6acab586a0b71
-
suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-