General
-
Target
68a1452172636b081873b9f7c1ae3794035c4ff50d5538b656caf07016b74d07.apk
-
Size
6.7MB
-
Sample
221027-tgem5acff6
-
MD5
a4c47367783405929e887ee955e21357
-
SHA1
424e86bb95dd9c18a0c576ff09bfb78433968ecd
-
SHA256
68a1452172636b081873b9f7c1ae3794035c4ff50d5538b656caf07016b74d07
-
SHA512
be5e1aa9663495b264c127479c95dc369dc8c05ea00943706aac76004d930df5ed60300c215e0148260153ed2c40a7ad8e38d71a371e6fdbcc364bdfc5208ea1
-
SSDEEP
98304:a3T0gL6HG6n8ZfpBR4bZcXxGaABrk02+D9sYS//75jRVMNN7bL/NLycThT0A7i1P:a3T086H1S4bZ6G2LSunhMLhT0I6QpeJz
Behavioral task
behavioral1
Sample
68a1452172636b081873b9f7c1ae3794035c4ff50d5538b656caf07016b74d07.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
68a1452172636b081873b9f7c1ae3794035c4ff50d5538b656caf07016b74d07.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
68a1452172636b081873b9f7c1ae3794035c4ff50d5538b656caf07016b74d07.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
furball
http://www.firmwaresystemupdate.com/mmh
Targets
-
-
Target
68a1452172636b081873b9f7c1ae3794035c4ff50d5538b656caf07016b74d07.apk
-
Size
6.7MB
-
MD5
a4c47367783405929e887ee955e21357
-
SHA1
424e86bb95dd9c18a0c576ff09bfb78433968ecd
-
SHA256
68a1452172636b081873b9f7c1ae3794035c4ff50d5538b656caf07016b74d07
-
SHA512
be5e1aa9663495b264c127479c95dc369dc8c05ea00943706aac76004d930df5ed60300c215e0148260153ed2c40a7ad8e38d71a371e6fdbcc364bdfc5208ea1
-
SSDEEP
98304:a3T0gL6HG6n8ZfpBR4bZcXxGaABrk02+D9sYS//75jRVMNN7bL/NLycThT0A7i1P:a3T086H1S4bZ6G2LSunhMLhT0I6QpeJz
Score7/10-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-