General

  • Target

    HappyMod.apk

  • Size

    16.1MB

  • Sample

    240212-wj1z9acd85

  • MD5

    1e14ecf210faae7238032b5f337e8af7

  • SHA1

    90d9072ada0a008d0bc8956755ac577774f28c7f

  • SHA256

    513f61033d8e87377f9de000a8c1b61d7ba6f7822ed19d1a8e3b834dfab3ec3f

  • SHA512

    71a4057791024ba4844de3b15d0daed490655a8b67209b16006e00d7362074b2774b4b3086a3362c868326dfaa134dc33c1c6e35e4760965d50bd6b1bebadd62

  • SSDEEP

    393216:Yp0TcbMT8KhcEb7N8kra+ABuHQgnMT/uGguE:YacQTNcEyWwuxjt

Score
7/10

Malware Config

Targets

    • Target

      HappyMod.apk

    • Size

      16.1MB

    • MD5

      1e14ecf210faae7238032b5f337e8af7

    • SHA1

      90d9072ada0a008d0bc8956755ac577774f28c7f

    • SHA256

      513f61033d8e87377f9de000a8c1b61d7ba6f7822ed19d1a8e3b834dfab3ec3f

    • SHA512

      71a4057791024ba4844de3b15d0daed490655a8b67209b16006e00d7362074b2774b4b3086a3362c868326dfaa134dc33c1c6e35e4760965d50bd6b1bebadd62

    • SSDEEP

      393216:Yp0TcbMT8KhcEb7N8kra+ABuHQgnMT/uGguE:YacQTNcEyWwuxjt

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks