General
-
Target
GoogleChrome5.31.1.apk
-
Size
3.1MB
-
Sample
220602-m8jmtsahhj
-
MD5
029ff646eec48591309652a724c836fc
-
SHA1
7cfbe7b28f797d6bef7c0cb50e7c98ca13f49bdc
-
SHA256
befa3bb2e619cc2116e883787b3e0e9824c2827ca1c0d1a096c073acf39a6817
-
SHA512
00e7f6c86a39e5821f3875509aa8afc65dc55e16ee45647800073c844d229e619c397956b93bfb746d329fcd26faacf1ec60360a6afffcd6fc35c31c1e4bb3c1
Static task
static1
Behavioral task
behavioral1
Sample
GoogleChrome5.31.1.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
GoogleChrome5.31.1.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
GoogleChrome5.31.1.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
GoogleChrome5.31.1.apk
-
Size
3.1MB
-
MD5
029ff646eec48591309652a724c836fc
-
SHA1
7cfbe7b28f797d6bef7c0cb50e7c98ca13f49bdc
-
SHA256
befa3bb2e619cc2116e883787b3e0e9824c2827ca1c0d1a096c073acf39a6817
-
SHA512
00e7f6c86a39e5821f3875509aa8afc65dc55e16ee45647800073c844d229e619c397956b93bfb746d329fcd26faacf1ec60360a6afffcd6fc35c31c1e4bb3c1
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-