General
-
Target
49251_Video_Player.apk
-
Size
4.6MB
-
Sample
240822-w284kstfkj
-
MD5
176d6ca459a33f3e2ac5bb9e5d30eb6c
-
SHA1
035e484288cc983844a08f69231ddbc9d797b17c
-
SHA256
003d2fd8ef8fc9d4765e4bbc650ecd20ef339be94606486629c003f683cb5982
-
SHA512
1f3f932db0ae3b3344284dc6eb10ee143a83bc28ff2550aef8ef693f507545f0163d0bb992364c708d8f4e3d9696f917305df91776299fa992a6de6338fde764
-
SSDEEP
98304:ymnJdoaleb5yyE0ABLryi1CWyHmPqQqfdf5vLMRB2PwO2vfX1kujDl:yixcNyyEprl1eGP2B5E2PwvdvXl
Static task
static1
Behavioral task
behavioral1
Sample
49251_Video_Player.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
49251_Video_Player.apk
-
Size
4.6MB
-
MD5
176d6ca459a33f3e2ac5bb9e5d30eb6c
-
SHA1
035e484288cc983844a08f69231ddbc9d797b17c
-
SHA256
003d2fd8ef8fc9d4765e4bbc650ecd20ef339be94606486629c003f683cb5982
-
SHA512
1f3f932db0ae3b3344284dc6eb10ee143a83bc28ff2550aef8ef693f507545f0163d0bb992364c708d8f4e3d9696f917305df91776299fa992a6de6338fde764
-
SSDEEP
98304:ymnJdoaleb5yyE0ABLryi1CWyHmPqQqfdf5vLMRB2PwO2vfX1kujDl:yixcNyyEprl1eGP2B5E2PwvdvXl
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-