General
-
Target
8-ball-pool-mod.apk
-
Size
62.1MB
-
Sample
240225-cmcbhsah2v
-
MD5
8fc75c7676bbee01d7dfedd224fc69da
-
SHA1
067df63745da7aa74d428d866c48434c428e834f
-
SHA256
050a787bdebf41aa373392f198f464000cfdab0c54688f2fb2786142e90b6cac
-
SHA512
f313e8de16635dba00e6c394c0d171b2867e932e3eac0be0d3d328cdc081f3c2e1011d055bdf0d017e080982d324e3cda87e1c1c96441d75224d730170e75ef6
-
SSDEEP
1572864:VgpTA6kNquze/35pQpt88YApF107e9SCR/zgHwJryxYn:VgdpkNqOQDQpt4ADSSXkxu
Static task
static1
Malware Config
Targets
-
-
Target
8-ball-pool-mod.apk
-
Size
62.1MB
-
MD5
8fc75c7676bbee01d7dfedd224fc69da
-
SHA1
067df63745da7aa74d428d866c48434c428e834f
-
SHA256
050a787bdebf41aa373392f198f464000cfdab0c54688f2fb2786142e90b6cac
-
SHA512
f313e8de16635dba00e6c394c0d171b2867e932e3eac0be0d3d328cdc081f3c2e1011d055bdf0d017e080982d324e3cda87e1c1c96441d75224d730170e75ef6
-
SSDEEP
1572864:VgpTA6kNquze/35pQpt88YApF107e9SCR/zgHwJryxYn:VgdpkNqOQDQpt4ADSSXkxu
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-