General
-
Target
E909B4ADCEF7B43FE8A1A8DCDBDF1E59F9A9BE01954FD8CD2D8DA27BADD18E35.apk
-
Size
4.0MB
-
Sample
220319-saf2yaccc9
-
MD5
a61a768c681d326bc19762cdeaacd375
-
SHA1
1e7a51456d60d6b53aeae656aaf0bc1eb68fd194
-
SHA256
e909b4adcef7b43fe8a1a8dcdbdf1e59f9a9be01954fd8cd2d8da27badd18e35
-
SHA512
d520f762c5eec0f47c00bef78156ba3809ea8d84a91729162848ed2480fe290a8a9fd6c0ac939dede5f9746bb460101f724f311a50b7c634ce3bf5067cced365
Static task
static1
Behavioral task
behavioral1
Sample
E909B4ADCEF7B43FE8A1A8DCDBDF1E59F9A9BE01954FD8CD2D8DA27BADD18E35.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
E909B4ADCEF7B43FE8A1A8DCDBDF1E59F9A9BE01954FD8CD2D8DA27BADD18E35.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
E909B4ADCEF7B43FE8A1A8DCDBDF1E59F9A9BE01954FD8CD2D8DA27BADD18E35.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
E909B4ADCEF7B43FE8A1A8DCDBDF1E59F9A9BE01954FD8CD2D8DA27BADD18E35.apk
-
Size
4.0MB
-
MD5
a61a768c681d326bc19762cdeaacd375
-
SHA1
1e7a51456d60d6b53aeae656aaf0bc1eb68fd194
-
SHA256
e909b4adcef7b43fe8a1a8dcdbdf1e59f9a9be01954fd8cd2d8da27badd18e35
-
SHA512
d520f762c5eec0f47c00bef78156ba3809ea8d84a91729162848ed2480fe290a8a9fd6c0ac939dede5f9746bb460101f724f311a50b7c634ce3bf5067cced365
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-