General
-
Target
wtv-v2.4.0.apk
-
Size
10.1MB
-
Sample
240614-fcc2vazamk
-
MD5
495dd5c3bf79bcdd140e69363e8172f0
-
SHA1
763a3749be02adeb2af0924c9ffea48c8e93127d
-
SHA256
04882bbbc0306e47a7234eaeb0b139d022aa07f3430c625b206c082e603364a2
-
SHA512
97cbe6ab11015eb07d0ae4bdb57309194da7a5c570a3121deba13efbdba3ce7401e0911ffdef67c488d7f74bc55793a6f1df75c77577698dc045029604b78da3
-
SSDEEP
196608:Kf3U12+uJxiMlAPLOs+rbqHQLLLLLLLLLD7VXuaT5jvYqXW6sskIGUJM5fB:Kfk1GxhKOPb8Upuq5z749FfB
Static task
static1
Behavioral task
behavioral1
Sample
wtv-v2.4.0.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
wtv-v2.4.0.apk
-
Size
10.1MB
-
MD5
495dd5c3bf79bcdd140e69363e8172f0
-
SHA1
763a3749be02adeb2af0924c9ffea48c8e93127d
-
SHA256
04882bbbc0306e47a7234eaeb0b139d022aa07f3430c625b206c082e603364a2
-
SHA512
97cbe6ab11015eb07d0ae4bdb57309194da7a5c570a3121deba13efbdba3ce7401e0911ffdef67c488d7f74bc55793a6f1df75c77577698dc045029604b78da3
-
SSDEEP
196608:Kf3U12+uJxiMlAPLOs+rbqHQLLLLLLLLLD7VXuaT5jvYqXW6sskIGUJM5fB:Kfk1GxhKOPb8Upuq5z749FfB
-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Checks the presence of a debugger
-