General
-
Target
SKALA VPN PRO_4.2.8.apk
-
Size
5.0MB
-
Sample
240425-r1t6tabf3w
-
MD5
f7fdc180da08bfd29078a24173799ef4
-
SHA1
e818354ec06b7342c1eed4d90470ba14cc2b03ce
-
SHA256
acd78086eb1260f9be1d03b26419dbbf7c11e8de476823ef7a82aa42ac1a2efc
-
SHA512
2821cf851b1feeb497f4924a605634248c0c4117d4e22c5d2416adb60eb08d639fd407c038e2f2753a94be3a95f41a3b66b283108303c9c84c2573fe05a36c7c
-
SSDEEP
98304:tcwzfujCFDXsmFzceZisE/Be7VMWudacONAA:tlzOWsaUsEpOzAA
Static task
static1
Behavioral task
behavioral1
Sample
SKALA VPN PRO_4.2.8.apk
Resource
android-33-x64-arm64-20240229-en
Malware Config
Targets
-
-
Target
SKALA VPN PRO_4.2.8.apk
-
Size
5.0MB
-
MD5
f7fdc180da08bfd29078a24173799ef4
-
SHA1
e818354ec06b7342c1eed4d90470ba14cc2b03ce
-
SHA256
acd78086eb1260f9be1d03b26419dbbf7c11e8de476823ef7a82aa42ac1a2efc
-
SHA512
2821cf851b1feeb497f4924a605634248c0c4117d4e22c5d2416adb60eb08d639fd407c038e2f2753a94be3a95f41a3b66b283108303c9c84c2573fe05a36c7c
-
SSDEEP
98304:tcwzfujCFDXsmFzceZisE/Be7VMWudacONAA:tlzOWsaUsEpOzAA
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-