General
-
Target
Dooneh.apk
-
Size
13.5MB
-
Sample
240522-nt141ade51
-
MD5
36c300197182e64d87440159098f71ce
-
SHA1
9f5cc990ff32291c76824e3f5fb44cca60164ae4
-
SHA256
44388e1ea127dca2b4400fda9f5a30e17dc4862ff142c7492f0bb9b7f793215e
-
SHA512
b3498d50cd098fb4c15364803c155853f58512a08615d26bc3cafbcc31a4ae808999bff2351dea76e95270ed4f9de936dea34bea6e53de00fe2f0d056ead6d9f
-
SSDEEP
393216:cEJdST96fM8Mcd0Z970eW2vkSGhu1YXOK3InCl1TPQpDgiKrk:bJUTEfL6ZN0ZSwBXh3IKRsEQ
Static task
static1
Behavioral task
behavioral1
Sample
Dooneh.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
Dooneh.apk
-
Size
13.5MB
-
MD5
36c300197182e64d87440159098f71ce
-
SHA1
9f5cc990ff32291c76824e3f5fb44cca60164ae4
-
SHA256
44388e1ea127dca2b4400fda9f5a30e17dc4862ff142c7492f0bb9b7f793215e
-
SHA512
b3498d50cd098fb4c15364803c155853f58512a08615d26bc3cafbcc31a4ae808999bff2351dea76e95270ed4f9de936dea34bea6e53de00fe2f0d056ead6d9f
-
SSDEEP
393216:cEJdST96fM8Mcd0Z970eW2vkSGhu1YXOK3InCl1TPQpDgiKrk:bJUTEfL6ZN0ZSwBXh3IKRsEQ
Score8/10-
Checks if the Android device is rooted.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-