General
-
Target
3529ee191fc7d8a351436adb058e1b3d4f1ab460638eb26eda1e0b5e98800dbb
-
Size
5.1MB
-
Sample
220516-tvwtkaaea2
-
MD5
814cc255fb09aa69934a0bd6209e2cc2
-
SHA1
ca78b55c86c329788806019c1eae1137ee48ee10
-
SHA256
3529ee191fc7d8a351436adb058e1b3d4f1ab460638eb26eda1e0b5e98800dbb
-
SHA512
9dfb359ea71622c0c33490d77c42912238398ce4e0a9ca5070329348b289c1bfd55ae4e165408d20ec6c9fccd4059701b7689c7ca2472212660a2f46be88805e
Static task
static1
Behavioral task
behavioral1
Sample
3529ee191fc7d8a351436adb058e1b3d4f1ab460638eb26eda1e0b5e98800dbb.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
3529ee191fc7d8a351436adb058e1b3d4f1ab460638eb26eda1e0b5e98800dbb.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
3529ee191fc7d8a351436adb058e1b3d4f1ab460638eb26eda1e0b5e98800dbb.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
3529ee191fc7d8a351436adb058e1b3d4f1ab460638eb26eda1e0b5e98800dbb
-
Size
5.1MB
-
MD5
814cc255fb09aa69934a0bd6209e2cc2
-
SHA1
ca78b55c86c329788806019c1eae1137ee48ee10
-
SHA256
3529ee191fc7d8a351436adb058e1b3d4f1ab460638eb26eda1e0b5e98800dbb
-
SHA512
9dfb359ea71622c0c33490d77c42912238398ce4e0a9ca5070329348b289c1bfd55ae4e165408d20ec6c9fccd4059701b7689c7ca2472212660a2f46be88805e
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-