General
-
Target
02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209.apk
-
Size
4.8MB
-
Sample
221027-tghd1scgdr
-
MD5
05eaa04bc27db3af51215d68a1d32d05
-
SHA1
222bb71aecb45d4430cefa1bfa0a53c3fa4a67f0
-
SHA256
02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209
-
SHA512
ab273e677ebd77f552c56d2c758b7fe201356b4bfd3694a5b1bf3691d195773bc5ed7f4efed1a3f101a9312d6d9e7aefdd92bb41f306551cd8f4b947fe622934
-
SSDEEP
98304:XM5qOMDIlsxIfmIoKw9+qpTSQPGs5A+7hyzGl/85Q9Gk:c5mDIeIeEtZE7hyzGV8Vk
Behavioral task
behavioral1
Sample
02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
furball
http://www.firmwaresystemupdate.com/mmh
Targets
-
-
Target
02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209.apk
-
Size
4.8MB
-
MD5
05eaa04bc27db3af51215d68a1d32d05
-
SHA1
222bb71aecb45d4430cefa1bfa0a53c3fa4a67f0
-
SHA256
02d6ca25b2057f181af96d2837486b26231eaa496defdf39785b5222014ef209
-
SHA512
ab273e677ebd77f552c56d2c758b7fe201356b4bfd3694a5b1bf3691d195773bc5ed7f4efed1a3f101a9312d6d9e7aefdd92bb41f306551cd8f4b947fe622934
-
SSDEEP
98304:XM5qOMDIlsxIfmIoKw9+qpTSQPGs5A+7hyzGl/85Q9Gk:c5mDIeIeEtZE7hyzGV8Vk
Score7/10-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-