General
-
Target
android_root.exe
-
Size
18.2MB
-
Sample
250222-fam42axqbt
-
MD5
fff6e0571a4c248c8242fe5bd0a3a583
-
SHA1
eab5d36dbbf8ba170b9c8e8196bf89953f75b931
-
SHA256
2f400f0b2fe121b8e5b1415a99dfda2f5502b7aa2e7002ef6e464f0d587dba0f
-
SHA512
2b618bd9219b9f7e7ccbb1435c756348dd109fce1f98eb12df18b90d21cca60ab88675c585cc8472f3be2828ec0dffed44131868275b4309682c769a7a4b442f
-
SSDEEP
393216:g9oFlWgKHM+0Z8NFDO/wqMKlBngr8InY/3cqgYkqFhbTVsq3+A:eovpoMpOvDOY4vW8IwcnYdTVsLA
Static task
static1
Behavioral task
behavioral1
Sample
android_root.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
android_root.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
android_root.exe
-
Size
18.2MB
-
MD5
fff6e0571a4c248c8242fe5bd0a3a583
-
SHA1
eab5d36dbbf8ba170b9c8e8196bf89953f75b931
-
SHA256
2f400f0b2fe121b8e5b1415a99dfda2f5502b7aa2e7002ef6e464f0d587dba0f
-
SHA512
2b618bd9219b9f7e7ccbb1435c756348dd109fce1f98eb12df18b90d21cca60ab88675c585cc8472f3be2828ec0dffed44131868275b4309682c769a7a4b442f
-
SSDEEP
393216:g9oFlWgKHM+0Z8NFDO/wqMKlBngr8InY/3cqgYkqFhbTVsq3+A:eovpoMpOvDOY4vW8IwcnYdTVsLA
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-