General
-
Target
Tap Translate Screen v1.62 [Modded].apk
-
Size
41MB
-
Sample
230203-exa8baea8v
-
MD5
7d4bac1d6f790c1391cd9633dc1920ee
-
SHA1
4fcb936d9a79a23b9114fccbeba2c82163fca65b
-
SHA256
4776f6dcc764dc695a4b06a2a0199fb06a1236dcd7ba042fae8ab8657c8723f4
-
SHA512
718478765461a25d9970037a847c62ece3bc8785a04ea9769dc33a1ea7bb26fe00d7d70d08f1679895c48455b894c1c5144c8ad65052fc23dd63799f0dac85f9
-
SSDEEP
786432:cKqxHJ73haO8X8JMC5OuRuH1d1Na4WssX6/I7fFqRkmIR7ifHOWU6nbH4LNE:cKqvjA8JMC5OAOTuq0XRhRiU6nboS
Static task
static1
Behavioral task
behavioral1
Sample
Tap Translate Screen v1.62 [Modded].apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
Tap Translate Screen v1.62 [Modded].apk
-
Size
41MB
-
MD5
7d4bac1d6f790c1391cd9633dc1920ee
-
SHA1
4fcb936d9a79a23b9114fccbeba2c82163fca65b
-
SHA256
4776f6dcc764dc695a4b06a2a0199fb06a1236dcd7ba042fae8ab8657c8723f4
-
SHA512
718478765461a25d9970037a847c62ece3bc8785a04ea9769dc33a1ea7bb26fe00d7d70d08f1679895c48455b894c1c5144c8ad65052fc23dd63799f0dac85f9
-
SSDEEP
786432:cKqxHJ73haO8X8JMC5OuRuH1d1Na4WssX6/I7fFqRkmIR7ifHOWU6nbH4LNE:cKqvjA8JMC5OAOTuq0XRhRiU6nboS
Score7/10-
Checks Android system properties for emulator presence.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation