General
-
Target
Android-Update (1).apk
-
Size
3.9MB
-
Sample
210730-eym2tde95e
-
MD5
333f95529ca58b782dafd1acdafd29ea
-
SHA1
12e12ab7bdd439837dd483b8a33d5b75767c085e
-
SHA256
df6be1f67e05ad5cefa8905a2dbb51a8e47790c349502c6b1e0701f2345d0720
-
SHA512
82b8b388b120819b478c6d9cd691311ff328acdce7d582abcafeca47e5eea20d2669bc5776082df5c99c1c345b8a063479a6a424e8963fe1923887c98d5b175d
Static task
static1
Behavioral task
behavioral1
Sample
Android-Update (1).apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
Android-Update (1).apk
Resource
android-x64-arm64
Behavioral task
behavioral3
Sample
Android-Update (1).apk
Resource
android-x64
Malware Config
Targets
-
-
Target
Android-Update (1).apk
-
Size
3.9MB
-
MD5
333f95529ca58b782dafd1acdafd29ea
-
SHA1
12e12ab7bdd439837dd483b8a33d5b75767c085e
-
SHA256
df6be1f67e05ad5cefa8905a2dbb51a8e47790c349502c6b1e0701f2345d0720
-
SHA512
82b8b388b120819b478c6d9cd691311ff328acdce7d582abcafeca47e5eea20d2669bc5776082df5c99c1c345b8a063479a6a424e8963fe1923887c98d5b175d
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-