General
-
Target
ToonDriveapk.apk
-
Size
15.9MB
-
Sample
230704-sx1d4aeh77
-
MD5
da3628b2a375448ed4b7410bf1b0c74e
-
SHA1
e33e4bb6558b0e256630ee8c1d4c6aca14333e4a
-
SHA256
888878403a44e4fd9835bccd327835f845851b3c54c2aa2d6b72744a472f6edc
-
SHA512
6a3a2e1ef09df463e0b2f53947f1fa2443f06647f40fe9dd02069b9da5275538cdbab12d27ebe856e852b4efd98bab9dbec862ec3300ed76a5f3cf9d477b8ab5
-
SSDEEP
393216:AHgC9ZMHVT/2CAHob38aF9d1osDISKP32NQQU:ygCzMHECAILnF1V/KPMbU
Static task
static1
Behavioral task
behavioral1
Sample
ToonDriveapk.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
ToonDriveapk.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
crear_transaction.html
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
crear_transaction.html
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
ToonDriveapk.apk
-
Size
15.9MB
-
MD5
da3628b2a375448ed4b7410bf1b0c74e
-
SHA1
e33e4bb6558b0e256630ee8c1d4c6aca14333e4a
-
SHA256
888878403a44e4fd9835bccd327835f845851b3c54c2aa2d6b72744a472f6edc
-
SHA512
6a3a2e1ef09df463e0b2f53947f1fa2443f06647f40fe9dd02069b9da5275538cdbab12d27ebe856e852b4efd98bab9dbec862ec3300ed76a5f3cf9d477b8ab5
-
SSDEEP
393216:AHgC9ZMHVT/2CAHob38aF9d1osDISKP32NQQU:ygCzMHECAILnF1V/KPMbU
Score9/10-
Renames multiple (52) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Removes a system notification.
-
-
-
Target
crear_transaction.html
-
Size
3KB
-
MD5
d6ff756b957c9d1e55de124e692099d0
-
SHA1
9e1701210b37688ad5c76a656aecc8b12fec5f82
-
SHA256
5ccdf32d36d4b5596d51c7d3776221f7768733c390b8cbb62a462e5ac6bf1d8b
-
SHA512
253db3579712b5465cae7554ff332ab41ae0577711c89a21fe68d0a066d410b15162045573bb31f03fbcb7a17ae530a769846d16a4d8e1503d42b8328f891795
Score1/10 -