General

  • Target

    7169e38881d2880c6c9a37cf21052393

  • Size

    1.2MB

  • MD5

    7169e38881d2880c6c9a37cf21052393

  • SHA1

    efbead728387ad889638d4bd950cf0c34e5a6bd0

  • SHA256

    15066f28ffd9519c14ecb03554dca0d69fcabaa0aca8afbc1c15eaed6ed33fa9

  • SHA512

    daa9a0012babd34213b8c7489855c6c3ab1cd2a6a9035bda8e3f8283904e6e29d0fdf31cdb3174855b68ba2aba41182eed1d4cb08030a9b9c3c7155abea19af0

  • SSDEEP

    24576:q9EhSi29cYX8URvhYdVPWIlkl5FWbJ9jXB31/KR06ko//xyi:qCAeE8UcdVPWIlkl7cjXNVKG6H//xd

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • 7169e38881d2880c6c9a37cf21052393
    .zip
  • AdbWinApi.dll
    .dll windows:6 windows x86 arch:x86

    c64cac39044626770353879245ea25e4


    Headers

    Imports

    Exports

    Sections

  • AdbWinUsbApi.dll
    .dll windows:6 windows x86 arch:x86

    fda9f9f5f569ddd0dbf3ad8a275a2eb8


    Headers

    Imports

    Exports

    Sections

  • adb.exe
    .exe windows:4 windows x86 arch:x86

    931e9c7fea29d599da22b0f3065f5b78


    Headers

    Imports

    Sections

  • root.bat
  • rootfiles/Superuser.apk
    .apk android

    eu.chainfire.supersu

    .MainActivity


  • rootfiles/busybox
    .elf linux arm
  • rootfiles/exynos-abuse
    .elf linux arm
  • rootfiles/root.sh
  • rootfiles/su
    .elf linux arm