General
-
Target
Indiaapp_MagicCash.apk
-
Size
13.9MB
-
Sample
240919-ezzcxs1djp
-
MD5
fa615cefc1971d88c9dbe9c145dcf9cc
-
SHA1
de4836b23095e979069219341e6266f2eb51c51e
-
SHA256
df67824f169f0a7ea9c4e533587a6b5043dd024f7791396f5038a4d2ce3a7df7
-
SHA512
491ed5ac4305179361e1002c93163bfb7afbaa5d4b1539944c9e1611e6a7cecec93338509ba6ac6cdeb5a6ae021dd0a4f8c1168ea9f18bad1e20c860ad152e44
-
SSDEEP
393216:4/fa9mzKJHhjartAm8toAx13bvoYN7NL+u4:4im+5h1tos13bvoYN7NKu4
Static task
static1
Behavioral task
behavioral1
Sample
Indiaapp_MagicCash.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
Indiaapp_MagicCash.apk
-
Size
13.9MB
-
MD5
fa615cefc1971d88c9dbe9c145dcf9cc
-
SHA1
de4836b23095e979069219341e6266f2eb51c51e
-
SHA256
df67824f169f0a7ea9c4e533587a6b5043dd024f7791396f5038a4d2ce3a7df7
-
SHA512
491ed5ac4305179361e1002c93163bfb7afbaa5d4b1539944c9e1611e6a7cecec93338509ba6ac6cdeb5a6ae021dd0a4f8c1168ea9f18bad1e20c860ad152e44
-
SSDEEP
393216:4/fa9mzKJHhjartAm8toAx13bvoYN7NL+u4:4im+5h1tos13bvoYN7NKu4
Score7/10-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1