General
-
Target
bigolive-bigotv.apk
-
Size
107.4MB
-
Sample
241120-epdngazfrh
-
MD5
a5a79db3cc35fa9a9d38265c33d9eb2c
-
SHA1
8cc911f039c7d6c5ab6628d888f74751602f1702
-
SHA256
47d95c2245124b6e1c9b61b422dde42bf2fed4b089cffd1550fb585650a80d89
-
SHA512
d0e1a4e1a07e279472acf37dfccb3a6095dfeb91225524c9d6e7da4e68649aa06b73b08f8982cd57824cad68c9b1c9473552612b33e6723594d5f5902f20d1b7
-
SSDEEP
3145728:dyC8ZWzmj3lr+rZqa3BBGwnk1tQvVvVWREaGQmn22:dyZamR6NqUB9nSe9VWChn22
Static task
static1
Behavioral task
behavioral1
Sample
bigolive-bigotv.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
bigolive-bigotv.apk
-
Size
107.4MB
-
MD5
a5a79db3cc35fa9a9d38265c33d9eb2c
-
SHA1
8cc911f039c7d6c5ab6628d888f74751602f1702
-
SHA256
47d95c2245124b6e1c9b61b422dde42bf2fed4b089cffd1550fb585650a80d89
-
SHA512
d0e1a4e1a07e279472acf37dfccb3a6095dfeb91225524c9d6e7da4e68649aa06b73b08f8982cd57824cad68c9b1c9473552612b33e6723594d5f5902f20d1b7
-
SSDEEP
3145728:dyC8ZWzmj3lr+rZqa3BBGwnk1tQvVvVWREaGQmn22:dyZamR6NqUB9nSe9VWChn22
Score8/10-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
3System Checks
3