General
-
Target
FlashPlayerV1.apk
-
Size
2.7MB
-
Sample
220519-kcvdcadaf8
-
MD5
dc09a6ce2314a97a4515df60a3628daa
-
SHA1
f00e5ddd740e8bfc996a03258efe4fd9445afc2d
-
SHA256
b7440319d58586bd84fcbce0573ec9c424fc5e8203f16a45bc689b035561d22c
-
SHA512
8fbab5efe65d29961f1c91c0499578d531ef5651ca7d70d9e28f365318408fb29cb1758e68c1364236f3c8860d9c0963eaa703fcb75de27bf0763e49f99af40d
Static task
static1
Behavioral task
behavioral1
Sample
FlashPlayerV1.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
FlashPlayerV1.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
FlashPlayerV1.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
FlashPlayerV1.apk
-
Size
2.7MB
-
MD5
dc09a6ce2314a97a4515df60a3628daa
-
SHA1
f00e5ddd740e8bfc996a03258efe4fd9445afc2d
-
SHA256
b7440319d58586bd84fcbce0573ec9c424fc5e8203f16a45bc689b035561d22c
-
SHA512
8fbab5efe65d29961f1c91c0499578d531ef5651ca7d70d9e28f365318408fb29cb1758e68c1364236f3c8860d9c0963eaa703fcb75de27bf0763e49f99af40d
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-