General

  • Target

    Magisk-v28.1.apk

  • Size

    11.2MB

  • MD5

    ebe29762bb3ba4397462812ecf28ba0c

  • SHA1

    c1611cf8276883622f5c2ede709113ffc7ec8227

  • SHA256

    8bfd3346b3da5814f82eff6f1b1b5fedd0ad585f39a25709b23eb54aac45691d

  • SHA512

    82ef2227f34315a60bdcbe1be10df6b5c2c76ff10b778760a2a53c1299cb2cb75c94f5c239ecfa9d0da3eabb738937db117a4ae55b1c7f74f93af236a1d83cd3

  • SSDEEP

    196608:0GaYVcVS4OlQ4OB2oTn9ko7scmdA5ASw7liDOLANeHqghsH5Wt5Red+La06NSnzG:0GbwUzbokAscmgq66ANGqCMdLzAS

Score
10/10

Malware Config

Signatures

  • Antidot family
  • Antidot payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • Magisk-v28.1.apk
    .apk android arch:arm64 arch:arm arch:x86 arch:x64

    com.topjohnwu.magisk

    com.topjohnwu.magisk.ui.MainActivity


  • stub.apk
    .apk android

    com.topjohnwu.magisk

    x.COMPONENT_PLACEHOLDER_2


Android Permissions

Magisk-v28.1.apk

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.HIDE_OVERLAY_WINDOWS

android.permission.UPDATE_PACKAGES_WITHOUT_USER_ACTION

android.permission.POST_NOTIFICATIONS

android.permission.RUN_USER_INITIATED_JOBS

android.permission.FOREGROUND_SERVICE

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.QUERY_ALL_PACKAGES