General
-
Target
minecraft-1-17-10(2).apk
-
Size
123.2MB
-
Sample
240612-eb9hzszfmh
-
MD5
41030959b4026c8b04db2dd3290e6878
-
SHA1
05379926404df5389800e1c47fd9782a89cfc75c
-
SHA256
431f92d0e1e846206d5c71d19010b6debfb906c91164a419d896fbe69662a460
-
SHA512
a235cccc2cd6a4733cb38449ecbe4e9f85fe405bdbac4e12cf9ae1c71b0029cd0112995f37742409c185ac721d000e7218ab5f35834cb1685095c52cd9fdffd6
-
SSDEEP
3145728:YzpV41EIAIP75OiyL68lzCltshFqLMru6NY3Q98T:YzpS1EGT5Ozm88Uh8YPYHT
Static task
static1
Behavioral task
behavioral1
Sample
minecraft-1-17-10(2).apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
minecraft-1-17-10(2).apk
-
Size
123.2MB
-
MD5
41030959b4026c8b04db2dd3290e6878
-
SHA1
05379926404df5389800e1c47fd9782a89cfc75c
-
SHA256
431f92d0e1e846206d5c71d19010b6debfb906c91164a419d896fbe69662a460
-
SHA512
a235cccc2cd6a4733cb38449ecbe4e9f85fe405bdbac4e12cf9ae1c71b0029cd0112995f37742409c185ac721d000e7218ab5f35834cb1685095c52cd9fdffd6
-
SSDEEP
3145728:YzpV41EIAIP75OiyL68lzCltshFqLMru6NY3Q98T:YzpS1EGT5Ozm88Uh8YPYHT
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2