General

  • Target

    b3a83b490cc2f555a2b943747191fda4

  • Size

    1.9MB

  • MD5

    b3a83b490cc2f555a2b943747191fda4

  • SHA1

    c3a187201c840e9bb249ebb03a38217f175624ea

  • SHA256

    14872e30b26643fd7b70b82926386d7cfa053f8f0f335744b35906952f5ab8db

  • SHA512

    9b4303e6035a4ae1ee78a7beed478bd3ed228bac9b438353d299387b54f818f174293abf5a36bb13b9beab2f485447bd5bbc0210483e8c476d2f691d33bce23a

  • SSDEEP

    49152:m8JyybMGEIcNoE0Vmffkg5fvzQr5WJlkDuqX1nnh01fQOkmD:muD7iN0QtLQr8kKqlnWAW

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • b3a83b490cc2f555a2b943747191fda4
    .zip
  • i9508_root/AdbWinApi.dll
    .dll windows:6 windows x86 arch:x86

    c64cac39044626770353879245ea25e4


    Headers

    Imports

    Exports

    Sections

  • i9508_root/AdbWinUsbApi.dll
    .dll windows:6 windows x86 arch:x86

    fda9f9f5f569ddd0dbf3ad8a275a2eb8


    Headers

    Imports

    Exports

    Sections

  • i9508_root/Superuser.apk
    .apk android arch:arm

    com.kingroot.kinguser

    com.kingroot.kinguser.activitys.SlideMainActivity


  • i9508_root/adb.exe
    .exe windows:4 windows x86 arch:x86

    879e62881b452fa51161345afb04a6de


    Headers

    Imports

    Sections

  • i9508_root/busybox
    .elf linux arm
  • i9508_root/pwn
    .elf linux arm
  • i9508_root/run.sh
    .sh linux
  • i9508_root/su
    .elf linux arm
  • i9508_root/˫.bat