General
-
Target
scj.apk
-
Size
7.7MB
-
Sample
240524-nycbfagc48
-
MD5
3a5b583cea64834856d578894ea3ecb6
-
SHA1
a355bed5b66b0b65beb217572012cdf945a2a3a8
-
SHA256
ea17fb44de4d788e47d79f203d21e11c8c863e993f4680bdac4f560407e8e221
-
SHA512
0d495d86b0e7eb832543fd12efba291f292ce60a98938866a4fb2d6679aa4c217fa9c6fa3c74f7fc12c196f8f4ead0cf21d0ff97e38e56843758099085a3cd71
-
SSDEEP
98304:5dAMt1pjU0C7RbwT+1zFlrp90yWbmaW/xVcYQUSsm/eCvSaVTFAJgPrxkB85zXOk:5uMt1po0C76mz5lK+paqiNVgS68tXb
Static task
static1
Behavioral task
behavioral1
Sample
scj.apk
Resource
android-x86-arm-20240514-en
Malware Config
Targets
-
-
Target
scj.apk
-
Size
7.7MB
-
MD5
3a5b583cea64834856d578894ea3ecb6
-
SHA1
a355bed5b66b0b65beb217572012cdf945a2a3a8
-
SHA256
ea17fb44de4d788e47d79f203d21e11c8c863e993f4680bdac4f560407e8e221
-
SHA512
0d495d86b0e7eb832543fd12efba291f292ce60a98938866a4fb2d6679aa4c217fa9c6fa3c74f7fc12c196f8f4ead0cf21d0ff97e38e56843758099085a3cd71
-
SSDEEP
98304:5dAMt1pjU0C7RbwT+1zFlrp90yWbmaW/xVcYQUSsm/eCvSaVTFAJgPrxkB85zXOk:5uMt1po0C76mz5lK+paqiNVgS68tXb
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-