General
-
Target
com.ykotmoar.bachu_1.4_apksfull.com.apk
-
Size
3.0MB
-
Sample
240503-e7tgmsfb9z
-
MD5
d57f914b233891a91ef6e215eaf1d733
-
SHA1
273986d3bd377de37567f1bccbc0f0a7dd1d2c91
-
SHA256
71918b4a43437dce5744d75533e9b5d6a14c60514066b52d47f04677bfa13712
-
SHA512
7ecf09757b792044c6a9d0b4f8fca1492b5c5689f2c84a18c92781d5c4309a6ab377df2d78b2965188593042e1ab137b19ec828435345b3c0f87c0db13d47e0c
-
SSDEEP
98304:WK4NjLkjSz8nhK9wCL4jFz/mdAd2ofrOcYgS:U5wjSqjCL4jFCkdS
Static task
static1
Behavioral task
behavioral1
Sample
com.ykotmoar.bachu_1.4_apksfull.com.apk
Resource
android-x86-arm-20240221-en
Malware Config
Targets
-
-
Target
com.ykotmoar.bachu_1.4_apksfull.com.apk
-
Size
3.0MB
-
MD5
d57f914b233891a91ef6e215eaf1d733
-
SHA1
273986d3bd377de37567f1bccbc0f0a7dd1d2c91
-
SHA256
71918b4a43437dce5744d75533e9b5d6a14c60514066b52d47f04677bfa13712
-
SHA512
7ecf09757b792044c6a9d0b4f8fca1492b5c5689f2c84a18c92781d5c4309a6ab377df2d78b2965188593042e1ab137b19ec828435345b3c0f87c0db13d47e0c
-
SSDEEP
98304:WK4NjLkjSz8nhK9wCL4jFz/mdAd2ofrOcYgS:U5wjSqjCL4jFCkdS
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
Checks the presence of a debugger
-