General
-
Target
PVZ-Fusion-2.0.4.apk
-
Size
924.5MB
-
Sample
240930-z6zx9awanm
-
MD5
b7fd91c5dc10c5b3946527b0cfc5c2c9
-
SHA1
3496e3e97cf01aec83384f39ac4fa12885c32dfe
-
SHA256
ff5bfc5b3850b58c07998179c8c2476200d48500dab68b9673e2464c7740476d
-
SHA512
5cfb632f1dea992b99c91852debd2618cdb9dd1551054305c07a03680a042cdf4092efccf8e11a017be7886db9c269f94c47656c5068ab6d0626582e7cfb24c9
-
SSDEEP
25165824:9JcmvQMg4b4YWethER+ojqVJ5mRlTnOhgsD/R:XDg4b42h0+kqVSlKDp
Static task
static1
Behavioral task
behavioral1
Sample
PVZ-Fusion-2.0.4.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
PVZ-Fusion-2.0.4.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
PVZ-Fusion-2.0.4.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
app.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
PVZ-Fusion-2.0.4.apk
-
Size
924.5MB
-
MD5
b7fd91c5dc10c5b3946527b0cfc5c2c9
-
SHA1
3496e3e97cf01aec83384f39ac4fa12885c32dfe
-
SHA256
ff5bfc5b3850b58c07998179c8c2476200d48500dab68b9673e2464c7740476d
-
SHA512
5cfb632f1dea992b99c91852debd2618cdb9dd1551054305c07a03680a042cdf4092efccf8e11a017be7886db9c269f94c47656c5068ab6d0626582e7cfb24c9
-
SSDEEP
25165824:9JcmvQMg4b4YWethER+ojqVJ5mRlTnOhgsD/R:XDg4b42h0+kqVSlKDp
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
-
-
Target
app.png
-
Size
52.0MB
-
MD5
49050b0de7fe433bbbc551d0629c92c0
-
SHA1
9ce726b45635ccd4c94d8a8faefc0a181e69d022
-
SHA256
bfc46fc40856d7d7dc640843db93d3190e492e4489628299c304ed9530c3014f
-
SHA512
856c7182890b277b491d589707fdfcd627929271ad386dcd65abb83f77857bd05e2758ad5f6d81ad468a31671308c90586f1c344e44faca9e9863d0e6dddf700
-
SSDEEP
786432:uBDzyC2aE8j8b06lfN868CkmhrRJgVIdsySu/UztBhUYJ9RqSGlnmfJrQdIU:uBDzyC2aE8wb06lJhrRetqPmRrQdIU
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2