General

  • Target

    6c75a3333d33126d00034d273d2faef5

  • Size

    1.2MB

  • MD5

    6c75a3333d33126d00034d273d2faef5

  • SHA1

    f75ae970ced9239395ba6d5b619c8a51a8cfdcab

  • SHA256

    030e3b21a195a9882d223afe49d7c7aec679ed5bddd1c94500eef764912e1da8

  • SHA512

    cb315a4ecaeb36b85df72e05e96fa062b5912b4084d31c3c8cfed18d66278ca97b0f275422a213b78ba0d5561383e27834abe9c11a67be58a9cccdfa69795dbf

  • SSDEEP

    24576:q9EhSi29cYX8URvhYdVPWIlkl5FWbJ9jXB31/KR06ko//xyv:qCAeE8UcdVPWIlkl7cjXNVKG6H//x4

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • 6c75a3333d33126d00034d273d2faef5
    .zip
  • AdbWinApi.dll
    .dll windows:6 windows x86 arch:x86

    c64cac39044626770353879245ea25e4


    Headers

    Imports

    Exports

    Sections

  • AdbWinUsbApi.dll
    .dll windows:6 windows x86 arch:x86

    fda9f9f5f569ddd0dbf3ad8a275a2eb8


    Headers

    Imports

    Exports

    Sections

  • adb.exe
    .exe windows:4 windows x86 arch:x86

    931e9c7fea29d599da22b0f3065f5b78


    Headers

    Imports

    Sections

  • root.bat
  • rootfiles/Superuser.apk
    .apk android

    eu.chainfire.supersu

    .MainActivity


  • rootfiles/busybox
    .elf linux arm
  • rootfiles/exynos-abuse
    .elf linux arm
  • rootfiles/root.sh
  • rootfiles/su
    .elf linux arm
  • ȿ˶.url
    .url