General
-
Target
SPORTSFIRE_2.0.3_APKPure.apk
-
Size
14.4MB
-
Sample
240616-2rs79ssape
-
MD5
1b27cbbc9b290e05524898395544d5f2
-
SHA1
4359a27739a367295c658e3fa95454dff65d1894
-
SHA256
fc8024d09dfa4ea34b7342b61027deae7c6f89a38af129c3794dd7f64ef47c34
-
SHA512
6020db97e2c3292e6d69ca01aa15e11e9c54d3c0d745f67030932ba8f663098759d4792dbecca0b53d2cdeabac9597c1ee19e4983ee4deda9769b6744c5cdde0
-
SSDEEP
393216:YJcTUCAmKU643GzovYHs+PbL+sWT3XJ1oIQ3IZ:/TUCAz+GE09PDWbJhCIZ
Static task
static1
Behavioral task
behavioral1
Sample
SPORTSFIRE_2.0.3_APKPure.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Targets
-
-
Target
SPORTSFIRE_2.0.3_APKPure.apk
-
Size
14.4MB
-
MD5
1b27cbbc9b290e05524898395544d5f2
-
SHA1
4359a27739a367295c658e3fa95454dff65d1894
-
SHA256
fc8024d09dfa4ea34b7342b61027deae7c6f89a38af129c3794dd7f64ef47c34
-
SHA512
6020db97e2c3292e6d69ca01aa15e11e9c54d3c0d745f67030932ba8f663098759d4792dbecca0b53d2cdeabac9597c1ee19e4983ee4deda9769b6744c5cdde0
-
SSDEEP
393216:YJcTUCAmKU643GzovYHs+PbL+sWT3XJ1oIQ3IZ:/TUCAz+GE09PDWbJhCIZ
Score8/10-
Checks if the Android device is rooted.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Checks the presence of a debugger
-