General
-
Target
8168af6bb0b60519480528003fcb41ee
-
Size
1.3MB
-
Sample
231222-lf2r9seffr
-
MD5
8168af6bb0b60519480528003fcb41ee
-
SHA1
1f6a673fc45abf94d60c6b79f830e9b6a9a9c9c6
-
SHA256
19c54e002938d336f5f6febed3f63d07e44521ccb8047bb971ca533f439f0afe
-
SHA512
25a6a190c9c6118b3af62b1e4f06f40249f9823c9e7f8b0c03a11ca321d29038cd41c3b2ec0391a24be117d089643c79494245cee8c536e141e34e29c4379318
-
SSDEEP
24576:/b3Xe5p4VToTkMnphBinL+S0OiI2MDMVtsCvGPnS5S+fAk:LGpilMnpjSjiIPDMHfgnsS+Ik
Static task
static1
Behavioral task
behavioral1
Sample
DHD_root.apk
Behavioral task
behavioral2
Sample
Superuser.apk
Behavioral task
behavioral3
Sample
Superuser.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral4
Sample
Superuser.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
DHD_root.apk
-
Size
1.2MB
-
MD5
abc88d92524a6eeebda1f8908f1e0725
-
SHA1
ef1e9c13357e2cfef1031844a8fde7d39cbc8de6
-
SHA256
46f14184c88c9af13ca6f215344461e11e1f1a920644d3911ca132a2280b38e9
-
SHA512
f06a84ef286b540010b4fd8e416391d44412c2ebf606edb445ce65712e4af97f3c42ebd4ab81ef9ddfec95c5667b893480b9bba774c90c819d2c1ec2f96bfb91
-
SSDEEP
24576:/Cm0QU9jlZCYDHVzJbBPvowcjPHt+uYChEFvtSHkPnzKA:P0xlVzJb3c7NVZqlU6nzKA
ScoreN/A -
-
-
Target
Superuser.apk
-
Size
191KB
-
MD5
4ec9e96986478cb000f9d58f374f39f5
-
SHA1
7479e11f4df198c743bd430ef54f94999690c73b
-
SHA256
df3c4cbe2b41398bf8e1e807f5ca1b8a6ca2ebe3f1686f95bc36ea83bbea694e
-
SHA512
66014107235633919b12ec22437d95651b9f00ea6a0eee5e90ee957b6a4e12b05cecd6a217d4b92e206d8e38442a9e10a754c4275a50fcf19c984b41edaf32f9
-
SSDEEP
3072:ysF8CMXMGIIFzrdQ5023X9phSTt6rUKaJ/O4OroXB2Nda6B5Hpb2/:dFsXoIxrdQ502JUpNTOsxgBpc/
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-