General
-
Target
up-mod-photomath-mod-apk-unlocked-plus-8-37-0-70000999.apk
-
Size
15.6MB
-
Sample
240614-j9xdjawbrn
-
MD5
70f535aabc82bd23f7d472028e33adda
-
SHA1
3d479c7109088cf9a53d536d319aa6e16f57716d
-
SHA256
0c69321d6b833e073378972d4ee9c0d8acd03231fe498558cd1d066d4a116736
-
SHA512
da2f0e54dad8574ebf3375e304427fe59b09819d181debd02838768e35d00269f8ebc88621e0201f75baa4d0a87d279ac4e309df6b30a78c17d99b6251e9913d
-
SSDEEP
393216:BLUxlOJICBgPtjOKNwatoLb1BihsWA+Zf:BLUxlQgPtjOKN/ObpWAyf
Static task
static1
Behavioral task
behavioral1
Sample
up-mod-photomath-mod-apk-unlocked-plus-8-37-0-70000999.apk
Resource
android-x64-20240611.1-en
Malware Config
Targets
-
-
Target
up-mod-photomath-mod-apk-unlocked-plus-8-37-0-70000999.apk
-
Size
15.6MB
-
MD5
70f535aabc82bd23f7d472028e33adda
-
SHA1
3d479c7109088cf9a53d536d319aa6e16f57716d
-
SHA256
0c69321d6b833e073378972d4ee9c0d8acd03231fe498558cd1d066d4a116736
-
SHA512
da2f0e54dad8574ebf3375e304427fe59b09819d181debd02838768e35d00269f8ebc88621e0201f75baa4d0a87d279ac4e309df6b30a78c17d99b6251e9913d
-
SSDEEP
393216:BLUxlOJICBgPtjOKNwatoLb1BihsWA+Zf:BLUxlQgPtjOKN/ObpWAyf
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-