General
-
Target
2_Chrome_obf.apk
-
Size
2.7MB
-
Sample
220802-g3gcmadagl
-
MD5
95a7f34f3e34c98298c864a530d64346
-
SHA1
4a5e09d2c3bc795e801b6cbe090cc384573f2a42
-
SHA256
2ae09bef7398cbf1999263a09949ec9e6baca4d25852a2cf758e546b2f4658ce
-
SHA512
87c7d2340f25b78f5ca7798b3ee548b5168579ba7b2d7a5bf7c01720d5fe92e3dd5f3f0347ec32b87532c417e4f3effc9d6b15fc04db494ddb08b5510e68f332
Static task
static1
Behavioral task
behavioral1
Sample
2_Chrome_obf.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
2_Chrome_obf.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
2_Chrome_obf.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
2_Chrome_obf.apk
-
Size
2.7MB
-
MD5
95a7f34f3e34c98298c864a530d64346
-
SHA1
4a5e09d2c3bc795e801b6cbe090cc384573f2a42
-
SHA256
2ae09bef7398cbf1999263a09949ec9e6baca4d25852a2cf758e546b2f4658ce
-
SHA512
87c7d2340f25b78f5ca7798b3ee548b5168579ba7b2d7a5bf7c01720d5fe92e3dd5f3f0347ec32b87532c417e4f3effc9d6b15fc04db494ddb08b5510e68f332
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-