General
-
Target
Star+_Premium_3_luzgamer.com.apk
-
Size
42.7MB
-
Sample
240612-dal6mazajp
-
MD5
45be29620ac9d6e66568252643b50215
-
SHA1
3af7a3014cb55379df38df116f5dd80b8f1ca572
-
SHA256
a134a5bb3a96c4def8165911bdf324b21525df3ced03a89647c69c73d16938b0
-
SHA512
15af87c50dc5f2dbe62a89e3cd188fa2531ebf13991f52ba0c55a4e69fc1d57498ccd694234271dcc7bd857c61db913c150118f2c3f91a1fc6cc7bf99c024101
-
SSDEEP
786432:4DgYlUt1fyae5Pz21X71xJE1u27VNttsxysZhQK1CQB9rlzpiO2/cD:4Na/E5PaL1xMum1xcKK1n9rlFz2/+
Static task
static1
Behavioral task
behavioral1
Sample
Star+_Premium_3_luzgamer.com.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
Star+_Premium_3_luzgamer.com.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
Star+_Premium_3_luzgamer.com.apk
-
Size
42.7MB
-
MD5
45be29620ac9d6e66568252643b50215
-
SHA1
3af7a3014cb55379df38df116f5dd80b8f1ca572
-
SHA256
a134a5bb3a96c4def8165911bdf324b21525df3ced03a89647c69c73d16938b0
-
SHA512
15af87c50dc5f2dbe62a89e3cd188fa2531ebf13991f52ba0c55a4e69fc1d57498ccd694234271dcc7bd857c61db913c150118f2c3f91a1fc6cc7bf99c024101
-
SSDEEP
786432:4DgYlUt1fyae5Pz21X71xJE1u27VNttsxysZhQK1CQB9rlzpiO2/cD:4Na/E5PaL1xMum1xcKK1n9rlFz2/+
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1