General
-
Target
subway-surfers-androeed.store-0-1729034867.apk
-
Size
179.0MB
-
Sample
241023-t68x9ssdjk
-
MD5
96aeb2a83518118f4e517375edcb3e09
-
SHA1
fed9bfd41ee0fd2ee39b842d66fd1bfd52638c73
-
SHA256
fbe74c2667f417dd2958df25d9da6946145edab1bce64c561b399fee359763b5
-
SHA512
bc3aebb9cc2807275a5b11e7743a1eba748906372864bff9f31175f7283168420babeec1325b808775b296519a971d1fa5591549773b1565e5bd73039bd7e741
-
SSDEEP
3145728:E+u3CFB004I7dHtHAlDdhMf334YMiXONbGxgYV2ei8xodxfYi14mXZRHG6QAA+cm:EX3CT0cHGlRh2n4mONbG2YV2xdGiDXZP
Static task
static1
Behavioral task
behavioral1
Sample
subway-surfers-androeed.store-0-1729034867.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
subway-surfers-androeed.store-0-1729034867.apk
-
Size
179.0MB
-
MD5
96aeb2a83518118f4e517375edcb3e09
-
SHA1
fed9bfd41ee0fd2ee39b842d66fd1bfd52638c73
-
SHA256
fbe74c2667f417dd2958df25d9da6946145edab1bce64c561b399fee359763b5
-
SHA512
bc3aebb9cc2807275a5b11e7743a1eba748906372864bff9f31175f7283168420babeec1325b808775b296519a971d1fa5591549773b1565e5bd73039bd7e741
-
SSDEEP
3145728:E+u3CFB004I7dHtHAlDdhMf334YMiXONbGxgYV2ei8xodxfYi14mXZRHG6QAA+cm:EX3CT0cHGlRh2n4mONbG2YV2xdGiDXZP
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Virtualization/Sandbox Evasion
2System Checks
2