General

  • Target

    8c67a975832092666a24efc52658af04

  • Size

    1.7MB

  • MD5

    8c67a975832092666a24efc52658af04

  • SHA1

    beb4df733b14eb5cef198e8050fb86a955c9c14b

  • SHA256

    28abeac6110302bb822ea41074569e35d231ef34a344feac0d72b585b9bfdb5a

  • SHA512

    caf32c2e52b83bbfb6c997ab9c167a4ce5d932ed51bfbe735ae18353e483c5872e52e305a13796e1b8af935e9c5ceb2a685566a520ce74ad66ba2e570f5c2d07

  • SSDEEP

    49152:FRqCieWtkL7uwtLKXiRF75Z9VEPxUfrUjn+ji:vIGOzXUFbOUoSji

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • 8c67a975832092666a24efc52658af04
    .zip
  • AdbWinApi.dll
    .dll windows:6 windows x86 arch:x86

    c64cac39044626770353879245ea25e4


    Headers

    Imports

    Exports

    Sections

  • AdbWinUsbApi.dll
    .dll windows:6 windows x86 arch:x86

    fda9f9f5f569ddd0dbf3ad8a275a2eb8


    Headers

    Imports

    Exports

    Sections

  • Superuser.apk
    .apk android

    com.noshufou.android.su

    HomeActivity


  • adb.exe
    .exe windows:4 windows x86 arch:x86

    9434bcb74195f7025a393fa105630d98


    Headers

    Imports

    Sections

  • busybox
    .elf linux arm
  • run.bat
  • su
    .elf linux arm
  • zergrush
    .elf linux arm