General
-
Target
golgol.apk
-
Size
8.1MB
-
Sample
220803-j2b3maghc7
-
MD5
499da9f8c6d8a2437f51637bc73fcdbe
-
SHA1
069b538392a6c3199cf5e503ce5d3f9cf60fe7ac
-
SHA256
7e95e9a306886dadbae68c586bf19eec6903bac15290fd60c47d29a2e3cbf047
-
SHA512
aed3b8bf2756173c292529b70976f604d204d723ce63186275020198871011bc072b4db7918e586883687f1b8f1981529880d44d59a7cfffd791942b2e3358c7
Static task
static1
Behavioral task
behavioral1
Sample
golgol.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
golgol.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
golgol.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
golgol.apk
-
Size
8.1MB
-
MD5
499da9f8c6d8a2437f51637bc73fcdbe
-
SHA1
069b538392a6c3199cf5e503ce5d3f9cf60fe7ac
-
SHA256
7e95e9a306886dadbae68c586bf19eec6903bac15290fd60c47d29a2e3cbf047
-
SHA512
aed3b8bf2756173c292529b70976f604d204d723ce63186275020198871011bc072b4db7918e586883687f1b8f1981529880d44d59a7cfffd791942b2e3358c7
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-