General

  • Target

    e7f7dfde31dd111c26c2421ba0ef800c

  • Size

    1.1MB

  • MD5

    e7f7dfde31dd111c26c2421ba0ef800c

  • SHA1

    fd6d0b768b375502eddb29cd30810250fac2af38

  • SHA256

    85993f17669708bcb2cdfd3c6f6672a8f739d5b8ae0d6ed095f7d07e6c8cdf65

  • SHA512

    7f3fa45e6f41cc97a05dc0d36092a157562459d0407e9c61550994b34d031db50ae46ccf74e03cb3a5b1fd0d74ffb45afa663ef311ebf52eb01f88068d85638b

  • SSDEEP

    24576:elc0f8n15MxA8hHD/NBHOXVxdRglySnklmf7zK9178kS2:70f8n1Om0D/NBHOXVNg0e9fXKrv

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • e7f7dfde31dd111c26c2421ba0ef800c
    .rar
  • N7000 ROOT/files/AdbWinApi.dll
    .dll windows:6 windows x86 arch:x86

    c64cac39044626770353879245ea25e4


    Headers

    Imports

    Exports

    Sections

  • N7000 ROOT/files/AdbWinUsbApi.dll
    .dll windows:6 windows x86 arch:x86

    fda9f9f5f569ddd0dbf3ad8a275a2eb8


    Headers

    Imports

    Exports

    Sections

  • N7000 ROOT/files/Superuser.apk
    .apk android

    com.noshufou.android.su

    Su


  • N7000 ROOT/files/adb.exe
    .exe windows:4 windows x86 arch:x86

    a1b17faeedfa5535c9395d057bbbb79a


    Headers

    Imports

    Sections

  • N7000 ROOT/files/busybox
    .elf linux arm
  • N7000 ROOT/files/su
    .elf linux arm
  • N7000 ROOT/files/zergRush
    .elf linux arm
  • N7000 ROOT/runme.bat