General
-
Target
SharkBot (16).apk
-
Size
14.9MB
-
Sample
221124-jyb88adc8t
-
MD5
dae48773e7003fe8e86ed4216bae2727
-
SHA1
54bcf3864770397a2ea3459e050d8766c0bea1cf
-
SHA256
fa7947933a3561b7174f1d94472dcf8633a03749c14342ce65dafe94db361140
-
SHA512
05176fff264e33a867b0169789030e94e38968ee23d4356f0c05c387889c89156cb8cc5753ad5b2362b0aad3cc7bf19c16ddac527eff3cd8981dcbc6cd383afc
-
SSDEEP
393216:E5eWG+vt+Y/BmacX7X52NWdXJq2TN2ydDwzpGrfum7F:WIEt+KqgY5MVcF
Static task
static1
Behavioral task
behavioral1
Sample
SharkBot (16).apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
SharkBot (16).apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
SharkBot (16).apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
SharkBot (16).apk
-
Size
14.9MB
-
MD5
dae48773e7003fe8e86ed4216bae2727
-
SHA1
54bcf3864770397a2ea3459e050d8766c0bea1cf
-
SHA256
fa7947933a3561b7174f1d94472dcf8633a03749c14342ce65dafe94db361140
-
SHA512
05176fff264e33a867b0169789030e94e38968ee23d4356f0c05c387889c89156cb8cc5753ad5b2362b0aad3cc7bf19c16ddac527eff3cd8981dcbc6cd383afc
-
SSDEEP
393216:E5eWG+vt+Y/BmacX7X52NWdXJq2TN2ydDwzpGrfum7F:WIEt+KqgY5MVcF
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-