General
-
Target
uptodown-com.kitkagames.fallbuddies.apk
-
Size
18.5MB
-
Sample
241101-n253xsymhx
-
MD5
581596b3d2bc505f14ba9c00eff0f910
-
SHA1
a414f0464fb59bc6fd5454c04ce7ca2357a4b4f4
-
SHA256
d62bfac566375971553d1bf260900888c879289de9d9a5315d8a135b82d20908
-
SHA512
3dd763fc9a4d6388408fc52f84a437c1d824809013a4d0f39c25c19fbc9824e20b46415b9fb086eb31ec2f686e638110800eb230314f60ac831127856cd57fdf
-
SSDEEP
196608:7r5cGyA8SnrOc3kcBwvkXbpgyEpCCx+ZqDMQxaqBIhwToCZ81CjMBBWgkfWhzy/x:7riGh8QMGGyzCJMQx5cRMMBBdhzyFOiJ
Static task
static1
Malware Config
Targets
-
-
Target
uptodown-com.kitkagames.fallbuddies.apk
-
Size
18.5MB
-
MD5
581596b3d2bc505f14ba9c00eff0f910
-
SHA1
a414f0464fb59bc6fd5454c04ce7ca2357a4b4f4
-
SHA256
d62bfac566375971553d1bf260900888c879289de9d9a5315d8a135b82d20908
-
SHA512
3dd763fc9a4d6388408fc52f84a437c1d824809013a4d0f39c25c19fbc9824e20b46415b9fb086eb31ec2f686e638110800eb230314f60ac831127856cd57fdf
-
SSDEEP
196608:7r5cGyA8SnrOc3kcBwvkXbpgyEpCCx+ZqDMQxaqBIhwToCZ81CjMBBWgkfWhzy/x:7riGh8QMGGyzCJMQx5cRMMBBdhzyFOiJ
-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Checks the presence of a debugger
-