General
-
Target
genryFok_build.apk
-
Size
3.1MB
-
Sample
220802-g4aw8sdbal
-
MD5
0474a037018fdd6993258e197c38ae5b
-
SHA1
4e0674b3ff4597ef2c31a26ec66bad7bad072e5d
-
SHA256
1da384d97e0706d3478453fdf89a9b1f255aeeead52b166f53355c2dbfcfe50a
-
SHA512
ac7e95e92c73384c3a088ad0fc4caac8018f463d3d6b9686092184cc9d8d81d56b70693c661de88d566e99b898bdb37662650a0e1e2b23dd74c517e7f950cab6
Static task
static1
Behavioral task
behavioral1
Sample
genryFok_build.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
genryFok_build.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
genryFok_build.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
genryFok_build.apk
-
Size
3.1MB
-
MD5
0474a037018fdd6993258e197c38ae5b
-
SHA1
4e0674b3ff4597ef2c31a26ec66bad7bad072e5d
-
SHA256
1da384d97e0706d3478453fdf89a9b1f255aeeead52b166f53355c2dbfcfe50a
-
SHA512
ac7e95e92c73384c3a088ad0fc4caac8018f463d3d6b9686092184cc9d8d81d56b70693c661de88d566e99b898bdb37662650a0e1e2b23dd74c517e7f950cab6
Score10/10-
Hydra payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-