General

  • Target

    ea63eaa4089c45e58ce54468c134200d

  • Size

    1.8MB

  • MD5

    ea63eaa4089c45e58ce54468c134200d

  • SHA1

    69070f3431d653bafa5fcb864e438d31e69026ce

  • SHA256

    a8f0d0f12dc1e8e9dd862356d4bf3fbc8284be0679e669b1d997d99c3d8b383c

  • SHA512

    5fb4890fd4c18b8085344db8ba5775e8cc5bb0294938faea626f7a7252954dfb68861b47bb1c77e0818fb03114cc65d978fe6deeb657e2ccaf9f5a2941af767c

  • SSDEEP

    49152:Qh1nzphoYNtGtU9Kjzw5QEwPYa7aHGToTu5o0edTXL8:QhFXmbz/Ewh7aHG8TPTA

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • ea63eaa4089c45e58ce54468c134200d
    .zip
  • InfoDroid.net.url
    .url
  • files/AdbWinApi.dll
    .dll windows:6 windows x86 arch:x86

    c64cac39044626770353879245ea25e4


    Headers

    Imports

    Exports

    Sections

  • files/AdbWinUsbApi.dll
    .dll windows:6 windows x86 arch:x86

    fda9f9f5f569ddd0dbf3ad8a275a2eb8


    Headers

    Imports

    Exports

    Sections

  • files/Superuser.apk
    .apk android

    com.noshufou.android.su

    HomeActivity


  • files/adb.exe
    .exe windows:4 windows x86 arch:x86

    a1b17faeedfa5535c9395d057bbbb79a


    Headers

    Imports

    Sections

  • files/busybox
    .elf linux arm
  • files/su
    .elf linux arm
  • files/zergRush
    .elf linux arm
  • runme.bat