General
-
Target
bypass free.zip
-
Size
4.5MB
-
Sample
240823-cml6qasdpp
-
MD5
875836e9849f774eb6674f11336413c5
-
SHA1
d2092a97447573c18cf2e194354bd20c1e91dd63
-
SHA256
b9b3dd3108cde440a9d8363a28ed1ea74870107fe7fdcb5a349776a911a2069d
-
SHA512
445ec571070b78d77c6fd9be36631e7bf0c3aba9e3009c4926b25e9bae286c8d534efaabeb83ecbc3941b36e4ee82c49900afd1fa899d377ab407864d493ece0
-
SSDEEP
98304:MxbRdH8111a7EO6h7Bu3EcaKjlLRz1QejRtoakLGp/:MxNG111aoOM1uUcaGdxZoLY
Static task
static1
Behavioral task
behavioral1
Sample
Virtual MOD_3.2.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
plugin.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
plugin.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
plugin.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
Virtual MOD_3.2.apk
-
Size
5.1MB
-
MD5
21b6ee6cac28641e4127d491b2070319
-
SHA1
bf559e49322c248bc904f14fd5658c764790046d
-
SHA256
5cbf639f9c2434de9227a412f52ffec78aa2c6f40b6d8cd913b248eb7fd96e86
-
SHA512
8d065be940512b5afc0f09a32ffc8cd3853b1325df7644de4f045e683d9485f22a1893b2417a09a1fb3e8da82a7bcc3318a12599e2c8f8dd8de9d3f0e61b590b
-
SSDEEP
98304:kMncVsu2KeFvFk7EO4EUMYlyHs3mddWRztQe3lbQakvY9u:kMcVsu0vFkoO4EWlylG55qvf
Score7/10-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the mobile country code (MCC)
-
Requests dangerous framework permissions
-
-
-
Target
plugin
-
Size
1.1MB
-
MD5
6678be7fd6acf4426181f48b3683cd93
-
SHA1
c186b574fea271e8e2b53736bb073e946e73affa
-
SHA256
828f12c340feb48dfc78389a365309398279adb7e07176bac6beed788ac8338c
-
SHA512
bf11ccfe5c7183ce747e6643b6ecb1074fe86469c9efbb023b931b398eb75efea83ae66ae3b88042f79f4d1c286ce2a6c2906b6b2ac93c71387339c2dd85dcbe
-
SSDEEP
24576:TWCAfka65HopEFmCmYgG2t2f+H7FN70wkr9cYMy6JQvl:K9fka6qYmCmfG2ta+bFNIwkryYM7Qvl
Score1/10 -