General
-
Target
dropper.apk
-
Size
4.8MB
-
Sample
241211-mrnkfsyqfw
-
MD5
4f618b5c8486c15bb859756eb092d9b2
-
SHA1
e3de3139ab8f352c125a76f53dddde919f3b4ed9
-
SHA256
f984ad6b075426be8dda2f28e1212d5c070fb92318d6590ab4436427aa556730
-
SHA512
09c9364a8665edeb59adb8f41b4f97c888fee345d2e2d434f77f367cbe6b4108bbda7606ea28c2fc3ff0410846558b7268f2588894f95d5ab757e4563adb0d1d
-
SSDEEP
98304:m3mUMdkaoLKauowdapCAx/MV3REvmXbGH+wIsFKX5+:m3mUEpauowdwCApvmLOI0U+
Behavioral task
behavioral1
Sample
dropper.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
dropper.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
dropper.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
dropper.apk
-
Size
4.8MB
-
MD5
4f618b5c8486c15bb859756eb092d9b2
-
SHA1
e3de3139ab8f352c125a76f53dddde919f3b4ed9
-
SHA256
f984ad6b075426be8dda2f28e1212d5c070fb92318d6590ab4436427aa556730
-
SHA512
09c9364a8665edeb59adb8f41b4f97c888fee345d2e2d434f77f367cbe6b4108bbda7606ea28c2fc3ff0410846558b7268f2588894f95d5ab757e4563adb0d1d
-
SSDEEP
98304:m3mUMdkaoLKauowdapCAx/MV3REvmXbGH+wIsFKX5+:m3mUEpauowdwCApvmLOI0U+
Score1/10 -
-
-
Target
base.apk
-
Size
3.6MB
-
MD5
133e25a18b8500d6abd78fbcc60bc044
-
SHA1
f1638daab573cbc191e97fefb04daf030fbfb311
-
SHA256
86fdfff09f03b0cde4cd0cde3ce0f75e37859925ef6fd89b372bbfada1ace572
-
SHA512
86fcb70d305ed5a0339bbba113b476e47447f5927f2903adfa109dcdb1cafeb2e79dbef1564088a982e5e4031e091a6416500f94d1980176887320b8c6cb1929
-
SSDEEP
49152:abgWswiy8VQ7mZt8zvnPxv+rbvleFmLzz6f37LKrYEkw2w/RnJorzvvR9j00oln4:aq1y8VQuGpGJeFmXtYDw2kErLPjz1
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-