General
-
Target
app-release.apk
-
Size
3.5MB
-
Sample
240707-3ak11a1ekq
-
MD5
b023ee162270c73767beb40e0c13d1b9
-
SHA1
09fe475b1125397c8920b28e711314426c894480
-
SHA256
2a9287911eea92821cdf5cbe945605ce2f654308c48fe213d271cfabb7f528c0
-
SHA512
268235c93ba2b752d8c5deef197e75dfd2b91a22c748ef99bfc0eefdeeba6c74a0c37b8ff6c62055d63f4875578b896365f4305f6bab716a666f5c951a6f7e87
-
SSDEEP
49152:WDQ5V+cnNAeN53Nfzq0e8HWXx7F9S+BLnynNRvY6VyLT9xx5t/gcQTronoSdWxtg:eIV7n5Jz/eVB7r0NR30LT9Bti4AckFo
Static task
static1
Behavioral task
behavioral1
Sample
app-release.apk
Resource
win11-20240704-en
Malware Config
Targets
-
-
Target
app-release.apk
-
Size
3.5MB
-
MD5
b023ee162270c73767beb40e0c13d1b9
-
SHA1
09fe475b1125397c8920b28e711314426c894480
-
SHA256
2a9287911eea92821cdf5cbe945605ce2f654308c48fe213d271cfabb7f528c0
-
SHA512
268235c93ba2b752d8c5deef197e75dfd2b91a22c748ef99bfc0eefdeeba6c74a0c37b8ff6c62055d63f4875578b896365f4305f6bab716a666f5c951a6f7e87
-
SSDEEP
49152:WDQ5V+cnNAeN53Nfzq0e8HWXx7F9S+BLnynNRvY6VyLT9xx5t/gcQTronoSdWxtg:eIV7n5Jz/eVB7r0NR30LT9Bti4AckFo
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-