General
-
Target
ipogo-13.8.apk
-
Size
157.6MB
-
Sample
240912-lvrwls1ekp
-
MD5
f3867e1ed6b6ea38e1e9fc1496e9e80a
-
SHA1
01dcdccb227240a3899fd9f0a51fb0166ea2377a
-
SHA256
c2b4a55e048b5f6642bc66351379116d80dd33385a180061303a34fb353b07ef
-
SHA512
ad7798cbbd90b196440f8c3ca960f7912a61b866cf3520175dab345a6903b49a036968ab5d38368c195ea2471594fc50ca3ba72d57bf984167f12dbd6ea70a3e
-
SSDEEP
3145728:3yJ4nfOoZ7jdMQJumEtTPCPYNxNj2UMZ8tKfknj9AifSy6ulwRlRcHVLC3Gue7WE:CJ4UQJujqPYNi1oj9Aa8lWOLe7WE
Static task
static1
Malware Config
Targets
-
-
Target
ipogo-13.8.apk
-
Size
157.6MB
-
MD5
f3867e1ed6b6ea38e1e9fc1496e9e80a
-
SHA1
01dcdccb227240a3899fd9f0a51fb0166ea2377a
-
SHA256
c2b4a55e048b5f6642bc66351379116d80dd33385a180061303a34fb353b07ef
-
SHA512
ad7798cbbd90b196440f8c3ca960f7912a61b866cf3520175dab345a6903b49a036968ab5d38368c195ea2471594fc50ca3ba72d57bf984167f12dbd6ea70a3e
-
SSDEEP
3145728:3yJ4nfOoZ7jdMQJumEtTPCPYNxNj2UMZ8tKfknj9AifSy6ulwRlRcHVLC3Gue7WE:CJ4UQJujqPYNi1oj9Aa8lWOLe7WE
-
Checks if the Android device is rooted.
-
Acquires the wake lock
-
Queries information about active data network
-
Listens for changes in the sensor environment (might be used to detect emulation)
-