General
-
Target
99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8
-
Size
3.4MB
-
Sample
230124-gakvcaac8w
-
MD5
2d21b43e6027134281324f460fc7fc66
-
SHA1
3d6bf52403c493e92140a52149898bc64f76e359
-
SHA256
99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8
-
SHA512
029eb7cff7ccf74b93f4667c786ba50320deee4f5c49bbe3ec1ca0bc8a8d0c34038a52931ffce6fa309f6e71fb1771a69f27ba373fc35308abbbaf2254607f97
-
SSDEEP
49152:5uLlr42cZpvL7zVfiHqF3UzV1cx4ZfWmpPSPWR1m/s6/wLZfuY79S77qF6qW5bMN:5+UvL7zVfticx4ZfHmiEEZfpSKFGVrc
Static task
static1
Behavioral task
behavioral1
Sample
99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8
-
Size
3.4MB
-
MD5
2d21b43e6027134281324f460fc7fc66
-
SHA1
3d6bf52403c493e92140a52149898bc64f76e359
-
SHA256
99e0053475ecd6a22b0e22b2441f0bf0a407b36be54e7d8220bb284c0bd494a8
-
SHA512
029eb7cff7ccf74b93f4667c786ba50320deee4f5c49bbe3ec1ca0bc8a8d0c34038a52931ffce6fa309f6e71fb1771a69f27ba373fc35308abbbaf2254607f97
-
SSDEEP
49152:5uLlr42cZpvL7zVfiHqF3UzV1cx4ZfWmpPSPWR1m/s6/wLZfuY79S77qF6qW5bMN:5+UvL7zVfticx4ZfHmiEEZfpSKFGVrc
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-