General
-
Target
org.codespark.thefoos-2230800.apk
-
Size
87.5MB
-
Sample
230327-l48kqach27
-
MD5
3f9eed7f8c288b8ca39c38017456f0b9
-
SHA1
be7f3e37e35ba5c3f73e19d6a2d89af2f5ca4f23
-
SHA256
40fbdfe1b133f0f08a6c7ed7a97e380b4ddb61c254c29b9672456982d640aa4f
-
SHA512
6a7015fe42261941dc0ce5546f6d624c7b2bfe9fef8beedd158ee22e65a4b40cc020ad22a695ade5a77d8f6834373bff81827d841c77bc0c1efa5cce3889dc3f
-
SSDEEP
1572864:VppUHNYQ9HcUYd5GrVi58Cae2kLLNjaUHHbDt0mR8NLhtnpqHHlmnYnWK85R0C3:VppUtYQCLAVU8CaepxjdHVH6tPywnG8z
Static task
static1
Behavioral task
behavioral1
Sample
org.codespark.thefoos-2230800.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
org.codespark.thefoos-2230800.apk
-
Size
87.5MB
-
MD5
3f9eed7f8c288b8ca39c38017456f0b9
-
SHA1
be7f3e37e35ba5c3f73e19d6a2d89af2f5ca4f23
-
SHA256
40fbdfe1b133f0f08a6c7ed7a97e380b4ddb61c254c29b9672456982d640aa4f
-
SHA512
6a7015fe42261941dc0ce5546f6d624c7b2bfe9fef8beedd158ee22e65a4b40cc020ad22a695ade5a77d8f6834373bff81827d841c77bc0c1efa5cce3889dc3f
-
SSDEEP
1572864:VppUHNYQ9HcUYd5GrVi58Cae2kLLNjaUHHbDt0mR8NLhtnpqHHlmnYnWK85R0C3:VppUtYQCLAVU8CaepxjdHVH6tPywnG8z
Score7/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-