General
-
Target
Framework1.0_JC.apk
-
Size
293KB
-
Sample
230901-tm4jfafg8y
-
MD5
a3d2be01b33a758822f1640c32788f32
-
SHA1
71ba7ada38b96220eac9d172310933a83e9a8649
-
SHA256
442016df9ae41e675b20c6a225282cffcf8f4e259ac50d04497c9c9c8e60c452
-
SHA512
25134cb72a544981cea0c3e1133a098cfd4c30fa7677f20376d511fceeb469d005fa2749d5b205bc6d635de36cddb2dde668935b57ce250e102885f00261888e
-
SSDEEP
6144:6f7KQq29bsCBcUP/9xLZR+1ZBct5Ec3I8bfPHdD8LX:m7Kn2oCiQ9u7ct5ETg9D8r
Behavioral task
behavioral1
Sample
Framework1.0_JC.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
Framework1.0_JC.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
Framework1.0_JC.apk
Resource
android-x64-arm64-20230831-en
Malware Config
Extracted
ahmyth
http://8.tcp.ngrok.io:11735?model=
Targets
-
-
Target
Framework1.0_JC.apk
-
Size
293KB
-
MD5
a3d2be01b33a758822f1640c32788f32
-
SHA1
71ba7ada38b96220eac9d172310933a83e9a8649
-
SHA256
442016df9ae41e675b20c6a225282cffcf8f4e259ac50d04497c9c9c8e60c452
-
SHA512
25134cb72a544981cea0c3e1133a098cfd4c30fa7677f20376d511fceeb469d005fa2749d5b205bc6d635de36cddb2dde668935b57ce250e102885f00261888e
-
SSDEEP
6144:6f7KQq29bsCBcUP/9xLZR+1ZBct5Ec3I8bfPHdD8LX:m7Kn2oCiQ9u7ct5ETg9D8r
Score7/10-
Tries to add a device administrator.
-
Legitimate hosting services abused for malware hosting/C2
-