General
-
Target
PREMIUM_IFSA_18_.apk
-
Size
4.0MB
-
Sample
210726-gjbsdmhfz2
-
MD5
63bc0255d48bf9bb567361f52dcda55e
-
SHA1
6b7d645160f0a7e880eb46e3eb8cdaef88c4314b
-
SHA256
283b3426a60d0d226efe7903732bb9185c68fb7ef81088c47b75c1f3621bf461
-
SHA512
217ab52a16b115b0f9e2011518092a489c0413c2b5035662229af322adf42268a6bce13b17ab5b86fc6df4962ccce33e76aa22967b9dbf197b4246ba8317bb1f
Static task
static1
Behavioral task
behavioral1
Sample
PREMIUM_IFSA_18_.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
PREMIUM_IFSA_18_.apk
Resource
android-x64-arm64
Behavioral task
behavioral3
Sample
PREMIUM_IFSA_18_.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
PREMIUM_IFSA_18_.apk
-
Size
4.0MB
-
MD5
63bc0255d48bf9bb567361f52dcda55e
-
SHA1
6b7d645160f0a7e880eb46e3eb8cdaef88c4314b
-
SHA256
283b3426a60d0d226efe7903732bb9185c68fb7ef81088c47b75c1f3621bf461
-
SHA512
217ab52a16b115b0f9e2011518092a489c0413c2b5035662229af322adf42268a6bce13b17ab5b86fc6df4962ccce33e76aa22967b9dbf197b4246ba8317bb1f
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-