General

  • Target

    db0d8d856027463595f06a4e46099fd1

  • Size

    1.5MB

  • MD5

    db0d8d856027463595f06a4e46099fd1

  • SHA1

    09506f5cb8fbdf0c3ae6aa20f17354a72fceaac8

  • SHA256

    d5d1d5bd631a3600f192de2bb569c20ef01483c31167995782a22dc0d88fcdc9

  • SHA512

    1922d47f200ed3345b77cde1b4071642aae9b3ea0eefac5790b1120009454c31b40dd4b8cce15847b20dafecd425fff268b7551ab82d7b9ab520590dd195b01b

  • SSDEEP

    24576:4lc0f8n15MxA8hHD/NB31GVxdRglySnklmf7zK917LTariIStqMrO7:x0f8n1Om0D/NB31GVNg0e9fXKr+a8SO

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 1 IoCs
  • Unsigned PE 4 IoCs

    Checks for missing Authenticode signature.

Files

  • db0d8d856027463595f06a4e46099fd1
    .rar
  • files/AdbWinApi.dll
    .dll windows:6 windows x86 arch:x86

    c64cac39044626770353879245ea25e4


    Headers

    Imports

    Exports

    Sections

  • files/AdbWinUsbApi.dll
    .dll windows:6 windows x86 arch:x86

    fda9f9f5f569ddd0dbf3ad8a275a2eb8


    Headers

    Imports

    Exports

    Sections

  • files/Superuser.apk
    .apk android

    com.noshufou.android.su

    HomeActivity


  • files/adb.exe
    .exe windows:4 windows x86 arch:x86

    a1b17faeedfa5535c9395d057bbbb79a


    Headers

    Imports

    Sections

  • files/busybox
    .elf linux arm
  • files/su
    .elf linux arm
  • files/zergRush
    .elf linux arm
  • wt19i.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections