General
-
Target
Google_chrome.apk
-
Size
4.9MB
-
Sample
220722-tzsmpsgde2
-
MD5
0df076628ae1c36d1a83adb1f0aa9da7
-
SHA1
e395429b36986a6a9a38b4f8c16f770881bfa9cd
-
SHA256
d5e69da84b83863f1fce0654244ee69a8dbbdc3727a654c3e06b2e1eb0f27a26
-
SHA512
30b489ea8a06511955a53b5b605e5f7b78bccf3566ec1f517ea062e5b21c98b8a4cca2bcda9d41a6f7b13cd714e5f9bf695676d92d5a5f336c16fb0dc82d8e03
Behavioral task
behavioral1
Sample
Google_chrome.apk
Resource
android-x64-20220621-en
Malware Config
Extracted
joker
https://cloudpin-detail.oss-accelerate.aliyuncs.com
Extracted
hydra
https://maxnote.site
Targets
-
-
Target
Google_chrome.apk
-
Size
4.9MB
-
MD5
0df076628ae1c36d1a83adb1f0aa9da7
-
SHA1
e395429b36986a6a9a38b4f8c16f770881bfa9cd
-
SHA256
d5e69da84b83863f1fce0654244ee69a8dbbdc3727a654c3e06b2e1eb0f27a26
-
SHA512
30b489ea8a06511955a53b5b605e5f7b78bccf3566ec1f517ea062e5b21c98b8a4cca2bcda9d41a6f7b13cd714e5f9bf695676d92d5a5f336c16fb0dc82d8e03
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-