General
-
Target
GODSARMY4K1.apk
-
Size
9.8MB
-
Sample
240523-nv3n8aeh73
-
MD5
27d17da20cac1db56a0d7ac5374a2019
-
SHA1
e40c2b9fbbe62cb6f1b03c057ad0be4c1ec879e5
-
SHA256
6598df0d861a1b5f46b55c04aca92b74b97cd1bf62af40c96540a26b0ad8d9d7
-
SHA512
bfeb08b181f6ac1f66b92f2dba93ba17814599f470e66833f50c5574a5065c8996e994ed1807748ec5da3f511e50db0004c855fe3903eb86f3dc5d3e186fd397
-
SSDEEP
196608:1WgfkkmLO1qS81DJexwrsLaIg9DQVc4xjR3/2Tm4y6:1WKmai3TnJyRwR
Static task
static1
Behavioral task
behavioral1
Sample
GODSARMY4K1.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
GODSARMY4K1.apk
-
Size
9.8MB
-
MD5
27d17da20cac1db56a0d7ac5374a2019
-
SHA1
e40c2b9fbbe62cb6f1b03c057ad0be4c1ec879e5
-
SHA256
6598df0d861a1b5f46b55c04aca92b74b97cd1bf62af40c96540a26b0ad8d9d7
-
SHA512
bfeb08b181f6ac1f66b92f2dba93ba17814599f470e66833f50c5574a5065c8996e994ed1807748ec5da3f511e50db0004c855fe3903eb86f3dc5d3e186fd397
-
SSDEEP
196608:1WgfkkmLO1qS81DJexwrsLaIg9DQVc4xjR3/2Tm4y6:1WKmai3TnJyRwR
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-