General
-
Target
HappyMod.apk
-
Size
16.1MB
-
Sample
240212-wj1z9acd85
-
MD5
1e14ecf210faae7238032b5f337e8af7
-
SHA1
90d9072ada0a008d0bc8956755ac577774f28c7f
-
SHA256
513f61033d8e87377f9de000a8c1b61d7ba6f7822ed19d1a8e3b834dfab3ec3f
-
SHA512
71a4057791024ba4844de3b15d0daed490655a8b67209b16006e00d7362074b2774b4b3086a3362c868326dfaa134dc33c1c6e35e4760965d50bd6b1bebadd62
-
SSDEEP
393216:Yp0TcbMT8KhcEb7N8kra+ABuHQgnMT/uGguE:YacQTNcEyWwuxjt
Static task
static1
Behavioral task
behavioral1
Sample
HappyMod.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
HappyMod.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
HappyMod.apk
-
Size
16.1MB
-
MD5
1e14ecf210faae7238032b5f337e8af7
-
SHA1
90d9072ada0a008d0bc8956755ac577774f28c7f
-
SHA256
513f61033d8e87377f9de000a8c1b61d7ba6f7822ed19d1a8e3b834dfab3ec3f
-
SHA512
71a4057791024ba4844de3b15d0daed490655a8b67209b16006e00d7362074b2774b4b3086a3362c868326dfaa134dc33c1c6e35e4760965d50bd6b1bebadd62
-
SSDEEP
393216:Yp0TcbMT8KhcEb7N8kra+ABuHQgnMT/uGguE:YacQTNcEyWwuxjt
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-