General
-
Target
67a7491b154ac_Agoda.apk
-
Size
4.9MB
-
Sample
250210-wd3a5azqbn
-
MD5
c1c87ded7d894017c31165387894d0d5
-
SHA1
916a6be7269dd465ad4e017dd9eb10d8170cbba3
-
SHA256
e40dc70d94e13e7fc1a58c9b940591bc01c1c37641f2ee61737c7625aa467c02
-
SHA512
7be66c39ee61a3aca933866fbd03c9e3a84bc502c3e1a8bb323bb6bc97589e2a4c26f56abacdb66d4df3b6ed586408cc7bce010061443cda68c814146c53ca43
-
SSDEEP
98304:13mUMdkaoLKauoKPCGKyiruNyQENzOOPsAjbO8RDvfKM:13mUEpauoKx5RKrUAj6EfKM
Behavioral task
behavioral1
Sample
67a7491b154ac_Agoda.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
67a7491b154ac_Agoda.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
67a7491b154ac_Agoda.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
67a7491b154ac_Agoda.apk
-
Size
4.9MB
-
MD5
c1c87ded7d894017c31165387894d0d5
-
SHA1
916a6be7269dd465ad4e017dd9eb10d8170cbba3
-
SHA256
e40dc70d94e13e7fc1a58c9b940591bc01c1c37641f2ee61737c7625aa467c02
-
SHA512
7be66c39ee61a3aca933866fbd03c9e3a84bc502c3e1a8bb323bb6bc97589e2a4c26f56abacdb66d4df3b6ed586408cc7bce010061443cda68c814146c53ca43
-
SSDEEP
98304:13mUMdkaoLKauoKPCGKyiruNyQENzOOPsAjbO8RDvfKM:13mUEpauoKx5RKrUAj6EfKM
Score1/10 -
-
-
Target
base.apk
-
Size
3.7MB
-
MD5
7531efaf77378e6969b2793ff5a81913
-
SHA1
9ffddafba7932be8925a120104fac84ceb71a071
-
SHA256
d40e45359546cb801887a38d4adb397327ce4bf0a166192f5f72165471fff10d
-
SHA512
acea2e24c2a19ccda810053e22fd46fb33490128f7d0a2560f353c70705608054f11afb1caf8aee2fd0d94746441081ad3503b636df4fe7925b11cfd1a364429
-
SSDEEP
98304:M1y8VDJ8nOjywaeY+La5UYHhQewQ7fLDcjzY:4y8Vl8OjIgOqYHmyzDcnY
Score7/10-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-