General
-
Target
DixMax-2.4.apk
-
Size
13.7MB
-
Sample
240901-vj3y6sxcjd
-
MD5
860583165cbf414981234281e089853c
-
SHA1
24da2d06de3976bfe604e6d49958657407fa4106
-
SHA256
5c0d9cf7d00522f54c849e849460dad53e247a167d71938a356dd5ccd1200ff1
-
SHA512
a0188e71f9de56cbb4208ce5f14e4948a3577f4b1c33359c03b960115cfdeec913049e2c74a15122bb09e000e1f561b3e12b44cbde5a7d3cbb40eec304bc9c78
-
SSDEEP
196608:GNJIyTQeyvph5X65MTH9iJjR4rhxFCACmQN6x8+BXEUjuw:SIyEe0hsiL4p8XjQc++B4w
Static task
static1
Behavioral task
behavioral1
Sample
DixMax-2.4.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
DixMax-2.4.apk
-
Size
13.7MB
-
MD5
860583165cbf414981234281e089853c
-
SHA1
24da2d06de3976bfe604e6d49958657407fa4106
-
SHA256
5c0d9cf7d00522f54c849e849460dad53e247a167d71938a356dd5ccd1200ff1
-
SHA512
a0188e71f9de56cbb4208ce5f14e4948a3577f4b1c33359c03b960115cfdeec913049e2c74a15122bb09e000e1f561b3e12b44cbde5a7d3cbb40eec304bc9c78
-
SSDEEP
196608:GNJIyTQeyvph5X65MTH9iJjR4rhxFCACmQN6x8+BXEUjuw:SIyEe0hsiL4p8XjQc++B4w
-
Checks if the Android device is rooted.
-
Acquires the wake lock
-
Queries information about active data network
-
Checks the presence of a debugger
-