General
-
Target
bsd_brawl_v55.211_(24).apk
-
Size
701.6MB
-
Sample
240522-xassyscd46
-
MD5
9a9fd187caecab754fd5c764ff60b86d
-
SHA1
86f803f5856eb05e76b8051cb2500667f2efa39c
-
SHA256
568e99ef7ddace784f181d18b4a68f995eb60c548c828a366feab8663d4ae15f
-
SHA512
0a4264635099cba9e14bf8bd4da078540d2dd4390b5b12ac8b9118088f98817c08dc12ee96a955cbdcf00685a74bb53bd125aa751035f4b3210010fd28d7be57
-
SSDEEP
12582912:GWQk5WdXlQP57cQMNsP5SdKqIYu9q1UCux64SXzfDYcRnKGGnGBLhS5HS3NRjJLe:PQk4XlQBWN85wUY+56tQ0KGGnuS526
Static task
static1
Behavioral task
behavioral1
Sample
bsd_brawl_v55.211_(24).apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
bsd_brawl_v55.211_(24).apk
-
Size
701.6MB
-
MD5
9a9fd187caecab754fd5c764ff60b86d
-
SHA1
86f803f5856eb05e76b8051cb2500667f2efa39c
-
SHA256
568e99ef7ddace784f181d18b4a68f995eb60c548c828a366feab8663d4ae15f
-
SHA512
0a4264635099cba9e14bf8bd4da078540d2dd4390b5b12ac8b9118088f98817c08dc12ee96a955cbdcf00685a74bb53bd125aa751035f4b3210010fd28d7be57
-
SSDEEP
12582912:GWQk5WdXlQP57cQMNsP5SdKqIYu9q1UCux64SXzfDYcRnKGGnGBLhS5HS3NRjJLe:PQk4XlQBWN85wUY+56tQ0KGGnuS526
Score8/10-
Checks if the Android device is rooted.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-