General
-
Target
4556936d8864a03fcd3586f6ada4fbce
-
Size
3.1MB
-
Sample
220622-se7qfshddn
-
MD5
4556936d8864a03fcd3586f6ada4fbce
-
SHA1
11e99f8c4255e1289fa99a6bf04efee9a487d85b
-
SHA256
d42c56e4bb96482a14b6b432737d73f39a991855feb118b1674c769d095baa66
-
SHA512
a01fa6ad24e2699dd731053cbe7a3aa9b71d3a5f5abe5d26ae6717d92a5aa934f228e58bb81a154a275933ec7277fadd762cd35fa36dad97148772b422a7873a
Static task
static1
Behavioral task
behavioral1
Sample
4556936d8864a03fcd3586f6ada4fbce.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
4556936d8864a03fcd3586f6ada4fbce.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
4556936d8864a03fcd3586f6ada4fbce.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
4556936d8864a03fcd3586f6ada4fbce
-
Size
3.1MB
-
MD5
4556936d8864a03fcd3586f6ada4fbce
-
SHA1
11e99f8c4255e1289fa99a6bf04efee9a487d85b
-
SHA256
d42c56e4bb96482a14b6b432737d73f39a991855feb118b1674c769d095baa66
-
SHA512
a01fa6ad24e2699dd731053cbe7a3aa9b71d3a5f5abe5d26ae6717d92a5aa934f228e58bb81a154a275933ec7277fadd762cd35fa36dad97148772b422a7873a
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-