General
-
Target
fffffffff.apk
-
Size
3.1MB
-
Sample
220523-zfmj8sffc3
-
MD5
0fdca6790eaeecfa67508b31a429e424
-
SHA1
ff05f9fe48d2c4f82d91dbb601ae0483311fe86c
-
SHA256
e3ccad0c792bb1fef21740837b9049bb91106bdc813948ce7d3f9d8984edda7d
-
SHA512
b65988b15783a77cf23ec6c9836df5e40efeb7d1d8280b5a54f23e98c665da228adbfa8992b5d681966c7ead67f2e163ca368766e53926b71fc1da4085dd2d4e
Static task
static1
Behavioral task
behavioral1
Sample
fffffffff.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
fffffffff.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
fffffffff.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
fffffffff.apk
-
Size
3.1MB
-
MD5
0fdca6790eaeecfa67508b31a429e424
-
SHA1
ff05f9fe48d2c4f82d91dbb601ae0483311fe86c
-
SHA256
e3ccad0c792bb1fef21740837b9049bb91106bdc813948ce7d3f9d8984edda7d
-
SHA512
b65988b15783a77cf23ec6c9836df5e40efeb7d1d8280b5a54f23e98c665da228adbfa8992b5d681966c7ead67f2e163ca368766e53926b71fc1da4085dd2d4e
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-