General
-
Target
8b93f879e9030312f4ab748c496092ed
-
Size
2.4MB
-
Sample
220802-tg8wzahghq
-
MD5
8b93f879e9030312f4ab748c496092ed
-
SHA1
7dfe55db40b2a39e9cb5ec10dd9515e0cf819f04
-
SHA256
90af19b082297b94f837f617fa67d2f7e894b6efb2b5917dbf97d194dde0c00b
-
SHA512
433e9f5559e54b0ebc35a7e826f2e2e9c2364a23d34100a6d4bb8422d331d8fd6bac180c952e956e87be46d2a2d08b8df42040c5a95510163740c32903c4720e
Static task
static1
Behavioral task
behavioral1
Sample
8b93f879e9030312f4ab748c496092ed.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
8b93f879e9030312f4ab748c496092ed.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
8b93f879e9030312f4ab748c496092ed.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
hydra
https://notpro.top
Targets
-
-
Target
8b93f879e9030312f4ab748c496092ed
-
Size
2.4MB
-
MD5
8b93f879e9030312f4ab748c496092ed
-
SHA1
7dfe55db40b2a39e9cb5ec10dd9515e0cf819f04
-
SHA256
90af19b082297b94f837f617fa67d2f7e894b6efb2b5917dbf97d194dde0c00b
-
SHA512
433e9f5559e54b0ebc35a7e826f2e2e9c2364a23d34100a6d4bb8422d331d8fd6bac180c952e956e87be46d2a2d08b8df42040c5a95510163740c32903c4720e
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-