General
-
Target
SharkBot (13).apk
-
Size
15.7MB
-
Sample
221124-jyaemadc7w
-
MD5
b0dde80553c8fe3827b6839117873450
-
SHA1
8e4a2f32f4416f7a83fa3fb1be0e33ee476db856
-
SHA256
218c6e2327c8342192dc58c6e793fc3d5cba7f15e4b2f188c98cd4ba48bf244a
-
SHA512
b06e1ebd8ae5594e4a738d1f74ab13f4b9854783a35424a6a005605055c78eae8afcd756af3defbbb73854c5c176bf02b862cf12a7366f771ce9b120ea9edcdc
-
SSDEEP
393216:cHZUiBmacX7X52NWdXJq2TN5+dcwBpObrfum79:c5BqgY5oHOL9
Static task
static1
Behavioral task
behavioral1
Sample
SharkBot (13).apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
SharkBot (13).apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
SharkBot (13).apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
SharkBot (13).apk
-
Size
15.7MB
-
MD5
b0dde80553c8fe3827b6839117873450
-
SHA1
8e4a2f32f4416f7a83fa3fb1be0e33ee476db856
-
SHA256
218c6e2327c8342192dc58c6e793fc3d5cba7f15e4b2f188c98cd4ba48bf244a
-
SHA512
b06e1ebd8ae5594e4a738d1f74ab13f4b9854783a35424a6a005605055c78eae8afcd756af3defbbb73854c5c176bf02b862cf12a7366f771ce9b120ea9edcdc
-
SSDEEP
393216:cHZUiBmacX7X52NWdXJq2TN5+dcwBpObrfum79:c5BqgY5oHOL9
Score7/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-