General
-
Target
E3DCF86812F72B774EE51563538AD2DEB75ABA98C583A561046D98E2A41D47F8.apk
-
Size
1014KB
-
Sample
220512-nfzn1scec8
-
MD5
a32c36009a37893be90e4f385b26b5ee
-
SHA1
1f3f0652c0d89c4907281d76de3c983373a5fcb2
-
SHA256
e3dcf86812f72b774ee51563538ad2deb75aba98c583a561046d98e2a41d47f8
-
SHA512
9358f3b1d5a48f8d438ca25f4dd8cb5cbc6887f7f1bd69b92d573c19d9857713c17e4a3d310b72d91d1fe419816fe1061ca8d96492d380af1b9dc0104adde7b4
Static task
static1
Behavioral task
behavioral1
Sample
E3DCF86812F72B774EE51563538AD2DEB75ABA98C583A561046D98E2A41D47F8.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
E3DCF86812F72B774EE51563538AD2DEB75ABA98C583A561046D98E2A41D47F8.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
E3DCF86812F72B774EE51563538AD2DEB75ABA98C583A561046D98E2A41D47F8.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Extracted
hydra
http://franciszekforster223.top
Targets
-
-
Target
E3DCF86812F72B774EE51563538AD2DEB75ABA98C583A561046D98E2A41D47F8.apk
-
Size
1014KB
-
MD5
a32c36009a37893be90e4f385b26b5ee
-
SHA1
1f3f0652c0d89c4907281d76de3c983373a5fcb2
-
SHA256
e3dcf86812f72b774ee51563538ad2deb75aba98c583a561046d98e2a41d47f8
-
SHA512
9358f3b1d5a48f8d438ca25f4dd8cb5cbc6887f7f1bd69b92d573c19d9857713c17e4a3d310b72d91d1fe419816fe1061ca8d96492d380af1b9dc0104adde7b4
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-