General
-
Target
6a483d3e3827ad58d08422dc50ca74878205f09d884fc355985dac9e342fa2b1.bin
-
Size
2.6MB
-
Sample
231112-1w89lscf2v
-
MD5
26a2a37e01f3537d7dfb9c5895997992
-
SHA1
2e7b8103048489b870a67389dbcde0cdc352b025
-
SHA256
6a483d3e3827ad58d08422dc50ca74878205f09d884fc355985dac9e342fa2b1
-
SHA512
f87bac3bb56474dbb27c550bbd7f8a75101bce286e51a35728a5b34e3c575c62c37f91b90be6693cdb85fb31eeff95e51a9331b026166aee0f9b00ac1e800a3b
-
SSDEEP
49152:JHsluagI3k4NvkuNZvodwJ6vKzDB0xcY0lPhHmir0Rs+LLcRohk32etO5M1ZEg:5sluIU4JkuNZvKwJpHY0jHXr0RJERoCj
Static task
static1
Behavioral task
behavioral1
Sample
6a483d3e3827ad58d08422dc50ca74878205f09d884fc355985dac9e342fa2b1.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
6a483d3e3827ad58d08422dc50ca74878205f09d884fc355985dac9e342fa2b1.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
6a483d3e3827ad58d08422dc50ca74878205f09d884fc355985dac9e342fa2b1.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
DefaultWsdlHelpGenerator.js
Resource
win7-20231025-en
Behavioral task
behavioral5
Sample
DefaultWsdlHelpGenerator.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
cid
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral7
Sample
ui.js
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
ui.js
Resource
win10v2004-20231025-en
Malware Config
Targets
-
-
Target
6a483d3e3827ad58d08422dc50ca74878205f09d884fc355985dac9e342fa2b1.bin
-
Size
2.6MB
-
MD5
26a2a37e01f3537d7dfb9c5895997992
-
SHA1
2e7b8103048489b870a67389dbcde0cdc352b025
-
SHA256
6a483d3e3827ad58d08422dc50ca74878205f09d884fc355985dac9e342fa2b1
-
SHA512
f87bac3bb56474dbb27c550bbd7f8a75101bce286e51a35728a5b34e3c575c62c37f91b90be6693cdb85fb31eeff95e51a9331b026166aee0f9b00ac1e800a3b
-
SSDEEP
49152:JHsluagI3k4NvkuNZvodwJ6vKzDB0xcY0lPhHmir0Rs+LLcRohk32etO5M1ZEg:5sluIU4JkuNZvKwJpHY0jHXr0RJERoCj
Score10/10-
Hydra payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-
-
-
Target
DefaultWsdlHelpGenerator.aspx
-
Size
59KB
-
MD5
f7be9f1841ff92f9d4040aed832e0c79
-
SHA1
b3e4b508aab3cf201c06892713b43ddb0c43b7ae
-
SHA256
751861040b69ea63a3827507b7c8da9c7f549dc181c1c8af4b7ca78cc97d710a
-
SHA512
380e97f7c17ee0fdf6177ed65f6e30de662a33a8a727d9f1874e9f26bd573434c3dedd655b47a21b998d32aaa72a0566df37e901fd6c618854039d5e0cbef3f5
-
SSDEEP
768:6CEPutHjvpMgMwP9h5Ij7khsp/6JtEZwMXVtkUI3t3CXyEyk3VbNbqDvJ4oT1y:/r6CdsCOZwMX3k5dWyklh+Dvbw
Score1/10 -
-
-
Target
cid
-
Size
5KB
-
MD5
831105fefa5412b2b365bdf7564fb516
-
SHA1
5f0f360513d28bbb54dba7f719e6b83d68cbf4de
-
SHA256
bad719b2ae9b5774f724d99b5d9ec701b8e2683919e912e490d7c9ea5389622d
-
SHA512
961bce352ab5ab9986efc377c3dfee12a27760cd7b9e4da779d639ebfb4182dd7e00a15979322c9ca769ba87d78806264a45ace65c811008fdd2008e3c78ac15
-
SSDEEP
96:auNrX8H2orqoAdRJPr9SgbhWollXU+9z4:DrXbRJJSgbhbl5i
Score1/10 -
-
-
Target
ui.js
-
Size
3KB
-
MD5
aee241652edfd5d33eb388756e8d2ea5
-
SHA1
ecde94d86f65706034b251ff49fba95e1434d19c
-
SHA256
3bf2f553433370b95dff0f7b4a17030a51a0fd861a594e8f41fe98ff1e22fad0
-
SHA512
a9cafa741e6b37e5fd0125662e6de3384a4963578dbe8db34bcfb2e6cf1ff3914e086f2bf26459fe2b299d3667676d4e6fb9a9ad25feaa473fb6d80464224792
Score1/10 -