General
-
Target
latte.apk
-
Size
3.2MB
-
Sample
220803-j54l2saahk
-
MD5
2766fe2cc89890935127ae864f88a309
-
SHA1
f7dc91ed1d4c85e72896b22acb9f192a36ca9ae3
-
SHA256
93c5e98c06963c8a320f5876148ad45fb6cce1a40a7aaee195cfa5027e19426b
-
SHA512
a9b59137d044d134417f63d38c361b9f5961f10915794a70c65e95a06bd6bdb5299325915b32be398808aabfd7aad5faea5a6b6617261b20a54f0fabb54f3ecb
Static task
static1
Behavioral task
behavioral1
Sample
latte.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
latte.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
latte.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
latte.apk
-
Size
3.2MB
-
MD5
2766fe2cc89890935127ae864f88a309
-
SHA1
f7dc91ed1d4c85e72896b22acb9f192a36ca9ae3
-
SHA256
93c5e98c06963c8a320f5876148ad45fb6cce1a40a7aaee195cfa5027e19426b
-
SHA512
a9b59137d044d134417f63d38c361b9f5961f10915794a70c65e95a06bd6bdb5299325915b32be398808aabfd7aad5faea5a6b6617261b20a54f0fabb54f3ecb
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-