General
-
Target
com.einnovation.temu_2.72.5.apk
-
Size
34.8MB
-
Sample
240606-pyfvasec4x
-
MD5
ecc93caf5f9d4a147d2608414ea15f3d
-
SHA1
c3a090d70a9fbf1b2a634ceed4792a3487b24d49
-
SHA256
bc22baff93b8a2b8e543ca4272dbcbd5dc528e36fe38263d72e9b60f3ec31ee5
-
SHA512
228843bc80d0a917f473492cf26207fb5088e112f80fe664122a1eb5e709e855d205b2d5dd2224afa83d5197f1d3e6573ef6b3e885736162b6ed7ec80c0e60ce
-
SSDEEP
196608:okZ717uNyfLTNd3o+E6qtJssPTyso6bGFPSUO+s7dY6:okZ7QKQ+E6qt2sPTyL6e6TZ1
Static task
static1
Malware Config
Targets
-
-
Target
com.einnovation.temu_2.72.5.apk
-
Size
34.8MB
-
MD5
ecc93caf5f9d4a147d2608414ea15f3d
-
SHA1
c3a090d70a9fbf1b2a634ceed4792a3487b24d49
-
SHA256
bc22baff93b8a2b8e543ca4272dbcbd5dc528e36fe38263d72e9b60f3ec31ee5
-
SHA512
228843bc80d0a917f473492cf26207fb5088e112f80fe664122a1eb5e709e855d205b2d5dd2224afa83d5197f1d3e6573ef6b3e885736162b6ed7ec80c0e60ce
-
SSDEEP
196608:okZ717uNyfLTNd3o+E6qtJssPTyso6bGFPSUO+s7dY6:okZ7QKQ+E6qt2sPTyL6e6TZ1
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-