General
-
Target
981c18b7fe8f0e47a5e5f1e67b8a66a2.apk
-
Size
2.4MB
-
Sample
221102-ezwl2ahcd7
-
MD5
981c18b7fe8f0e47a5e5f1e67b8a66a2
-
SHA1
3c26529c09a2cf168d22ac1cad88b55c1e515113
-
SHA256
d105764cd5383acacd463517691a0a7578847a8174664fc2c1da5efd8a30719d
-
SHA512
438e0bc868742d534f6504e4b4860afe63f0012c99dcf41cd6b2fdde88a3ed835f101d71c65bc3bd61696cb8b9dbea657042794c492dfbc6eee1ab3876ae6039
-
SSDEEP
49152:yekGLrMrdYCdA/nVB83w4lnntA2ZGM2FtfiMbMlIAHhROmynu:yekGLrOdAPb83w4mM+DQiAhROmwu
Static task
static1
Behavioral task
behavioral1
Sample
981c18b7fe8f0e47a5e5f1e67b8a66a2.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
981c18b7fe8f0e47a5e5f1e67b8a66a2.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
981c18b7fe8f0e47a5e5f1e67b8a66a2.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
981c18b7fe8f0e47a5e5f1e67b8a66a2.apk
-
Size
2.4MB
-
MD5
981c18b7fe8f0e47a5e5f1e67b8a66a2
-
SHA1
3c26529c09a2cf168d22ac1cad88b55c1e515113
-
SHA256
d105764cd5383acacd463517691a0a7578847a8174664fc2c1da5efd8a30719d
-
SHA512
438e0bc868742d534f6504e4b4860afe63f0012c99dcf41cd6b2fdde88a3ed835f101d71c65bc3bd61696cb8b9dbea657042794c492dfbc6eee1ab3876ae6039
-
SSDEEP
49152:yekGLrMrdYCdA/nVB83w4lnntA2ZGM2FtfiMbMlIAHhROmynu:yekGLrOdAPb83w4mM+DQiAhROmwu
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-