General
-
Target
HappyMod-3-0-9 (1).apk
-
Size
16.1MB
-
Sample
240328-nrpyyshb95
-
MD5
2c569157a85addc9e495ff2b2f1d2a57
-
SHA1
25dd2df8ab6b09cf17c4afe85b0c10767eac7525
-
SHA256
82ce66c59fa6532feef0ecb0bbc67eabbdb3e0225ba23b6472da85a2dd1795ff
-
SHA512
b5fbe249b865b8ecc2b93e9d3083a181138bbff721e7428249c4b4cb30afd2a914349b4ab3192f292bd44c5708b65e76d9ad0a66ed4d03602e7b2ddac6ed9744
-
SSDEEP
393216:Dp0TcbMT8jhcEb7NYivQBSWALHi9mD41cnhVS3dxS:DacQT8cE+iIYLJmOhVS3dA
Static task
static1
Behavioral task
behavioral1
Sample
HappyMod-3-0-9 (1).apk
Resource
android-x64-20240221-en
Behavioral task
behavioral2
Sample
HappyMod-3-0-9 (1).apk
Resource
android-x64-arm64-20240221-en
Malware Config
Targets
-
-
Target
HappyMod-3-0-9 (1).apk
-
Size
16.1MB
-
MD5
2c569157a85addc9e495ff2b2f1d2a57
-
SHA1
25dd2df8ab6b09cf17c4afe85b0c10767eac7525
-
SHA256
82ce66c59fa6532feef0ecb0bbc67eabbdb3e0225ba23b6472da85a2dd1795ff
-
SHA512
b5fbe249b865b8ecc2b93e9d3083a181138bbff721e7428249c4b4cb30afd2a914349b4ab3192f292bd44c5708b65e76d9ad0a66ed4d03602e7b2ddac6ed9744
-
SSDEEP
393216:Dp0TcbMT8jhcEb7NYivQBSWALHi9mD41cnhVS3dxS:DacQT8cE+iIYLJmOhVS3dA
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-