General
-
Target
app-release.apk
-
Size
69.5MB
-
Sample
240424-z2pxgshf71
-
MD5
6392927515ca5aa30f380b813d73b14f
-
SHA1
0f5f722e231b8d07a83595109e8908be64caabe3
-
SHA256
f056afa9e7ac9c0f44653088b36461cc3f4b9a5b35960c03a9a807efd70f31b0
-
SHA512
3a0a4000c5c3f80553267c09e4b8b4394021a4eba6843f80464f2dc6fcc5a4ab0aa90aa88286134b9ffe2249d7bdec263cf1918de706c1cfe3e39d9a87951be6
-
SSDEEP
1572864:DbmJ7/xSsZ6T/drcunyToBXXeEBpYu8EqFT4NeXlArO:XGJSsZ6T/drcunyToB+EBpYu8EqFT4Gf
Static task
static1
Behavioral task
behavioral1
Sample
app-release.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
app-release.apk
-
Size
69.5MB
-
MD5
6392927515ca5aa30f380b813d73b14f
-
SHA1
0f5f722e231b8d07a83595109e8908be64caabe3
-
SHA256
f056afa9e7ac9c0f44653088b36461cc3f4b9a5b35960c03a9a807efd70f31b0
-
SHA512
3a0a4000c5c3f80553267c09e4b8b4394021a4eba6843f80464f2dc6fcc5a4ab0aa90aa88286134b9ffe2249d7bdec263cf1918de706c1cfe3e39d9a87951be6
-
SSDEEP
1572864:DbmJ7/xSsZ6T/drcunyToBXXeEBpYu8EqFT4NeXlArO:XGJSsZ6T/drcunyToB+EBpYu8EqFT4Gf
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Checks the presence of a debugger
-