General
-
Target
c143da.apk
-
Size
3.3MB
-
Sample
220527-yd7a7aacd9
-
MD5
961b128f14e38b1eefac212a2d369e90
-
SHA1
b37a61a033b2e61d6c0d3dae200a3543da434b6a
-
SHA256
c143da0e00aa8d320a85193448c86eeaf7087763f9b75621a560a9043dad4251
-
SHA512
c1ce85a0134202dfa943b5ce4361dc17802692bc76b0a9b5d5645e51d32c5a815e2b7aff10c7eaafaddb6a35579b9b2e5be810e3bec92dc42ea7494202458419
Static task
static1
Behavioral task
behavioral1
Sample
c143da.apk
Resource
android-x64-20220310-en
Malware Config
Targets
-
-
Target
c143da.apk
-
Size
3.3MB
-
MD5
961b128f14e38b1eefac212a2d369e90
-
SHA1
b37a61a033b2e61d6c0d3dae200a3543da434b6a
-
SHA256
c143da0e00aa8d320a85193448c86eeaf7087763f9b75621a560a9043dad4251
-
SHA512
c1ce85a0134202dfa943b5ce4361dc17802692bc76b0a9b5d5645e51d32c5a815e2b7aff10c7eaafaddb6a35579b9b2e5be810e3bec92dc42ea7494202458419
Score10/10-
Hydra Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-