General
-
Target
Google_Play_Store.apk
-
Size
2.2MB
-
Sample
220815-fk8tgshcd2
-
MD5
40fc97a5fe3be6cb3879392881ca8b62
-
SHA1
2f311abbfb0803d5ab36d4b77029c277edcc86c2
-
SHA256
9501e061fb8c1b44a3733b3bab0c13429346b449c721792a41accfacccbd5dd2
-
SHA512
36428b4ef6a661b74333f103c5fa73bd318808b06731a892bbf6b09b0f775a8db74e12dd184e2e8e1b96f54602779c27343d6bc50c3c31b29733ef22c3369ccc
Static task
static1
Behavioral task
behavioral1
Sample
Google_Play_Store.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
Google_Play_Store.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
Google_Play_Store.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
hydra
http://hagkokyogedses.net
Targets
-
-
Target
Google_Play_Store.apk
-
Size
2.2MB
-
MD5
40fc97a5fe3be6cb3879392881ca8b62
-
SHA1
2f311abbfb0803d5ab36d4b77029c277edcc86c2
-
SHA256
9501e061fb8c1b44a3733b3bab0c13429346b449c721792a41accfacccbd5dd2
-
SHA512
36428b4ef6a661b74333f103c5fa73bd318808b06731a892bbf6b09b0f775a8db74e12dd184e2e8e1b96f54602779c27343d6bc50c3c31b29733ef22c3369ccc
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-