General
-
Target
xxx_Dropper.apk
-
Size
5.3MB
-
Sample
240409-da9lxscc47
-
MD5
12309f410c5b76a7d8003c82086dd7ac
-
SHA1
186f9f241a0e74a68c19090643b44dda456a0ad9
-
SHA256
27cbb8480c36ce717e8c9044e51663e7df5bca937a54c68fd79b18b1b5d61fcc
-
SHA512
dec0c9f76cd691d36a1407a695d545bc0f9357d79b5a51ae25ee5a2629b71a2fac1765a5333f7a4e55b25d2422b0f4333b9564d560aa66135f0ceeeadc760aa2
-
SSDEEP
98304:4QdO+s7oXCyAE/tLY7cQSAqnlfK8LUxSko7wN0O8pCxk2ax9:4WInREJ8cvKWUxSk9N38pCxk2A
Behavioral task
behavioral1
Sample
xxx_Dropper.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral2
Sample
childapp.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
xxx_Dropper.apk
-
Size
5.3MB
-
MD5
12309f410c5b76a7d8003c82086dd7ac
-
SHA1
186f9f241a0e74a68c19090643b44dda456a0ad9
-
SHA256
27cbb8480c36ce717e8c9044e51663e7df5bca937a54c68fd79b18b1b5d61fcc
-
SHA512
dec0c9f76cd691d36a1407a695d545bc0f9357d79b5a51ae25ee5a2629b71a2fac1765a5333f7a4e55b25d2422b0f4333b9564d560aa66135f0ceeeadc760aa2
-
SSDEEP
98304:4QdO+s7oXCyAE/tLY7cQSAqnlfK8LUxSko7wN0O8pCxk2ax9:4WInREJ8cvKWUxSk9N38pCxk2A
Score1/10 -
-
-
Target
childapp.apk
-
Size
4.4MB
-
MD5
6b7991c3b97889f06ad8b1127bf364af
-
SHA1
fea84c2cd3996ed6828d3736e2369e19c0552c2c
-
SHA256
bb3292f6a888f4e7c90177b260b473d8fa5276418110cedad32f9cf90ccd693e
-
SHA512
d9532e43656ca0fc8d0f6014c24878ddee7eccfe16199237218a3f6d98d98639c34be183b2bb474a60e6ee4ef876e88342f77adcbbcd0e8bc76498e492359162
-
SSDEEP
98304:4CmAQe+jkBqvrugXE5VmzEzBuTL0twSg0mf:4CmqgXCYz90NAf
Score8/10-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries account information for other applications stored on the device.
Application may abuse the framework's APIs to collect account information stored on the device.
-
Acquires the wake lock
-