General
-
Target
1cd74efc878dfe8fa2d40b24c927a50b46ae60f9c0b8c1a205119c89c5edba69
-
Size
17.1MB
-
Sample
231223-qg5yjadeg7
-
MD5
ab6699451c2718822dfd7d6b998a7f6a
-
SHA1
f94018b5b78ba193cfa4b992d49ca2ae6f104d7b
-
SHA256
1cd74efc878dfe8fa2d40b24c927a50b46ae60f9c0b8c1a205119c89c5edba69
-
SHA512
fff67477c98b20afa3f7b940418683ebe1b4488e8ab4b3baab375f71bd1ca86cff750a4ace165450e3c16587403652a9536f7a88661f232aba7fe4bd347e467f
-
SSDEEP
393216:g6zeS8671mwmVWMuoFGqw2CUeZ1tn4gV/1tTIA7:g6zt86xmwmVWu8qw2C71tn4gR1tTIA7
Static task
static1
Behavioral task
behavioral1
Sample
1cd74efc878dfe8fa2d40b24c927a50b46ae60f9c0b8c1a205119c89c5edba69.apk
Behavioral task
behavioral2
Sample
1cd74efc878dfe8fa2d40b24c927a50b46ae60f9c0b8c1a205119c89c5edba69.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral3
Sample
market_game_crack_v1.2.2.apk
Behavioral task
behavioral4
Sample
market_game_crack_v1.2.2.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral5
Sample
market_game_crack_v1.2.2.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral6
Sample
plugin-deploy.apk
Behavioral task
behavioral7
Sample
plugin-deploy.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral8
Sample
plugin-deploy.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
1cd74efc878dfe8fa2d40b24c927a50b46ae60f9c0b8c1a205119c89c5edba69
-
Size
17.1MB
-
MD5
ab6699451c2718822dfd7d6b998a7f6a
-
SHA1
f94018b5b78ba193cfa4b992d49ca2ae6f104d7b
-
SHA256
1cd74efc878dfe8fa2d40b24c927a50b46ae60f9c0b8c1a205119c89c5edba69
-
SHA512
fff67477c98b20afa3f7b940418683ebe1b4488e8ab4b3baab375f71bd1ca86cff750a4ace165450e3c16587403652a9536f7a88661f232aba7fe4bd347e467f
-
SSDEEP
393216:g6zeS8671mwmVWMuoFGqw2CUeZ1tn4gV/1tTIA7:g6zt86xmwmVWu8qw2C71tn4gR1tTIA7
Score1/10 -
-
-
Target
market_game_crack_v1.2.2.apk
-
Size
2.3MB
-
MD5
0de4814bc507e82955c679d4bdb59965
-
SHA1
dab9bd732406d7f0ff17c3bf756c044cb1f2bc6f
-
SHA256
d79e05e2fc6a4ba60da245b17d5d0806aeb5c340c5f20600718fd5b77bd944da
-
SHA512
3e893a80b7e947f67e6f60f299a520981c83090523a191b8a88859a653eb1d306144415734cd3e97d83da0dc5e79956cfcaced1e3032fa20a15dc07409f0b7bf
-
SSDEEP
49152:d54KZw7iQ0YFKZlgfdDvHaa04jUmQe/ONWMoBFp0mu0:nfy7B0YYzgVjHa2UmJDMoBFp0mb
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Reads information about phone network operator.
-
-
-
Target
plugin-deploy.jar
-
Size
141KB
-
MD5
9f4bbcd28bcd69e8bc4ce666a14ab362
-
SHA1
0919eb3d9a4cc4dc494a9ba983120d50caee373a
-
SHA256
9936759227ab2008f8fc16cc08b04b3a8e394260dbb6f75f176457d2b0539c1c
-
SHA512
2c40138dc94f1b0483f0c7203c9e7c29118f21b475bfea875a1214feb2b9e79e75243a45dfcfe431065c9e9a9cfaaa43b152c68cd8e372b31e6a31eb3bc77487
-
SSDEEP
3072:K9FFjFj1v+/d3wzw+K9hKF717GIGKaPtFBtlSuoSBCx5sA1P3+TbS:8VtGA8+Kf2lGIG5FDSICxyjTbS
Score1/10 -