General
-
Target
file.apk
-
Size
2.7MB
-
Sample
240520-yv4lmafb48
-
MD5
ac79187fd3024fb9cb5d1a872461503c
-
SHA1
c48240ce763e07b690e4fe79d6dfe69eeeebf8bd
-
SHA256
a6f6e6fb44626f8e609b3ccb6cbf73318baf01d08ef84720706b205f2864b116
-
SHA512
7f86e193359aab2d5970e7a3346bd98a96d35bea8074dc889d30eac3a3010181bd0c6a768b44895a717635a7ffc7e8cd4c3d8d95a80c9b09c2c137358c0603ae
-
SSDEEP
49152:U4CJQ42CbqPuuPx0ZH349hOVyPbs2faMrtm87ptAPfMW9pZU23V/1rF:U/OIuJ0RQhOVyg2ic7+HU23h1x
Static task
static1
Behavioral task
behavioral1
Sample
file.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
file.apk
-
Size
2.7MB
-
MD5
ac79187fd3024fb9cb5d1a872461503c
-
SHA1
c48240ce763e07b690e4fe79d6dfe69eeeebf8bd
-
SHA256
a6f6e6fb44626f8e609b3ccb6cbf73318baf01d08ef84720706b205f2864b116
-
SHA512
7f86e193359aab2d5970e7a3346bd98a96d35bea8074dc889d30eac3a3010181bd0c6a768b44895a717635a7ffc7e8cd4c3d8d95a80c9b09c2c137358c0603ae
-
SSDEEP
49152:U4CJQ42CbqPuuPx0ZH349hOVyPbs2faMrtm87ptAPfMW9pZU23V/1rF:U/OIuJ0RQhOVyg2ic7+HU23h1x
-
Checks if the Android device is rooted.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
Checks the presence of a debugger
-