General
-
Target
psk.apk
-
Size
2.9MB
-
Sample
220516-jps6dafeg3
-
MD5
147ef9f8890c63a44610520d0391e9b0
-
SHA1
6b58f1ef78d0d3481f9037cbb43a14b91f4e3be9
-
SHA256
bc8d4ef11a68a6523a3a762ae5a5ce670e2fc4def138a3e4da762615325e8a13
-
SHA512
1f9faa8c5e36b38d079bc1e39f2540fe2ff32e6ed2cbe97a4cddacd5a8ee12f1ebc073834dbc8dad8176b7c6e1af2e46f09acecefb44c7c303a2c2a81fea1829
Static task
static1
Behavioral task
behavioral1
Sample
psk.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
psk.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
psk.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
psk.apk
-
Size
2.9MB
-
MD5
147ef9f8890c63a44610520d0391e9b0
-
SHA1
6b58f1ef78d0d3481f9037cbb43a14b91f4e3be9
-
SHA256
bc8d4ef11a68a6523a3a762ae5a5ce670e2fc4def138a3e4da762615325e8a13
-
SHA512
1f9faa8c5e36b38d079bc1e39f2540fe2ff32e6ed2cbe97a4cddacd5a8ee12f1ebc073834dbc8dad8176b7c6e1af2e46f09acecefb44c7c303a2c2a81fea1829
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-