General
-
Target
TapTap_Global_3.3.8-rel.100000_seo.apk
-
Size
40.9MB
-
Sample
230325-2vc1fsgf7z
-
MD5
35b1108c8ca32c5ecd9dd1f8525f5dcc
-
SHA1
ae4e95d66cc825d9e4bb879b3959cdd097991962
-
SHA256
6121606292e3e7ad5c55dc25a72ff449bae693a928fc862d9fc1d6a93d5f3c0e
-
SHA512
d19e66d252a01a1553ef37fe1da9523fca4f489d932aa9575c4cb2e57032d78633b0cc9f92279bf35d36002ad39123bb677b62101c7ea86797bddc6f31027774
-
SSDEEP
786432:5hZbFjz+cEp9ZM4+z6K8IW5sYcfIJKtmS+cxoDM1mG+fqe7UmH0G4qDVIh4:hFOcEKftvW6tAktz+cxoDMx+fqe9H0Az
Static task
static1
Behavioral task
behavioral1
Sample
TapTap_Global_3.3.8-rel.100000_seo.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
TapTap_Global_3.3.8-rel.100000_seo.apk
-
Size
40.9MB
-
MD5
35b1108c8ca32c5ecd9dd1f8525f5dcc
-
SHA1
ae4e95d66cc825d9e4bb879b3959cdd097991962
-
SHA256
6121606292e3e7ad5c55dc25a72ff449bae693a928fc862d9fc1d6a93d5f3c0e
-
SHA512
d19e66d252a01a1553ef37fe1da9523fca4f489d932aa9575c4cb2e57032d78633b0cc9f92279bf35d36002ad39123bb677b62101c7ea86797bddc6f31027774
-
SSDEEP
786432:5hZbFjz+cEp9ZM4+z6K8IW5sYcfIJKtmS+cxoDM1mG+fqe7UmH0G4qDVIh4:hFOcEKftvW6tAktz+cxoDMx+fqe9H0Az
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Checks Android system properties for emulator presence.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-