General
-
Target
PornHub v6.16.0 Premium Mod Apk {CracksHash}.apk
-
Size
17.5MB
-
Sample
240523-e39m3adg7y
-
MD5
8465aef4f3a06a20574d8f4750cb3212
-
SHA1
2e8c9efad1994ace0193545fc428b97fd41bb125
-
SHA256
ba091a77f1c1812f187186d701e8b234a65ffb63dca2d47ed838459364c8023e
-
SHA512
428d32c8d83cb7eef033603a08db8745d8360cb27335367ad14a4d7a46a36f6a1fca0353f7977cdec6ed691ed7329b2c6115194c80f8eb7dbae7085cb9735e2c
-
SSDEEP
393216:+lYkKnV10c7JYC54MpwRznbzCIs8ETFIC8eD71KtCZck5od6XQG:+WV10c7KNnC+gFIkD71K48d5G
Static task
static1
Behavioral task
behavioral1
Sample
PornHub v6.16.0 Premium Mod Apk {CracksHash}.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
origin.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
origin.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
origin.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
PornHub v6.16.0 Premium Mod Apk {CracksHash}.apk
-
Size
17.5MB
-
MD5
8465aef4f3a06a20574d8f4750cb3212
-
SHA1
2e8c9efad1994ace0193545fc428b97fd41bb125
-
SHA256
ba091a77f1c1812f187186d701e8b234a65ffb63dca2d47ed838459364c8023e
-
SHA512
428d32c8d83cb7eef033603a08db8745d8360cb27335367ad14a4d7a46a36f6a1fca0353f7977cdec6ed691ed7329b2c6115194c80f8eb7dbae7085cb9735e2c
-
SSDEEP
393216:+lYkKnV10c7JYC54MpwRznbzCIs8ETFIC8eD71KtCZck5od6XQG:+WV10c7KNnC+gFIkD71K48d5G
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Requests dangerous framework permissions
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
Checks the presence of a debugger
-
-
-
Target
origin.apk
-
Size
237KB
-
MD5
d706369e44995ea254b3af600619e82b
-
SHA1
f610ca69df995ebf6a479bae5c52108397cce3b9
-
SHA256
6733f8497fe78ade3a31db81297397181c1ff9ba94d544b7f0c6c7983e90960b
-
SHA512
5edb58d5e9e7a032e8a171e80004dd7776e6349eab6d60525d98ecdd656cfa8fd28a5ad46f65080643ff11abba5b59ff52d1c18b8b911b7e3b9716e34633a2ab
-
SSDEEP
6144:qyki5O3sxEdat2NKmNPmgrNNrHgKkuiqDxbsqoJyrjje+:qyWce4mNPmghqENsJJcN
Score1/10 -
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
1System Checks
1