General
-
Target
Chrome.apk
-
Size
4.4MB
-
Sample
220609-mrnkfsfbdn
-
MD5
65f634ef24fd686225aa4765fc63fe2b
-
SHA1
fe4a7d079cc00e730412c7a6e0b177829ee58a73
-
SHA256
f4d18662c927380a2d30eba367fafd3746fa137df499cb50d49e591a420aa95d
-
SHA512
1dfd4069dc664d6062c76a49c0925b7bf0ecf7fda8bd345fe5980100bc413f93e2853e0be9e89db03b42de90c0d8017f31c17f73470462345c31d50a7a6c47fe
Static task
static1
Behavioral task
behavioral1
Sample
Chrome.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
Chrome.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
Chrome.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
Chrome.apk
-
Size
4.4MB
-
MD5
65f634ef24fd686225aa4765fc63fe2b
-
SHA1
fe4a7d079cc00e730412c7a6e0b177829ee58a73
-
SHA256
f4d18662c927380a2d30eba367fafd3746fa137df499cb50d49e591a420aa95d
-
SHA512
1dfd4069dc664d6062c76a49c0925b7bf0ecf7fda8bd345fe5980100bc413f93e2853e0be9e89db03b42de90c0d8017f31c17f73470462345c31d50a7a6c47fe
Score8/10-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-