General
-
Target
driving-v4.4.apk
-
Size
293KB
-
Sample
250325-eh79haz1hx
-
MD5
fd548aaf77ba7ce088c6945ef93a55c9
-
SHA1
257fb47afcad834a8d9691f9f2044bd77ed34b66
-
SHA256
0d9e79d8e22395fb952653b440c0bef36ea6fcd3536122044704b25030598769
-
SHA512
3149cb7141add77f7036cdf78e82dc94140d731c22425a8f6c103866360a50c76962748fb5f16b5f161fcb7ef71a981f230af1c2704a2bdb20ed2026c0b4ec70
-
SSDEEP
3072:VZeJmmaGOrkq72nb/Un0t2mFi9mp/t0uLL4Xa/G5b5oTfaAqG1ZjZaeeExgy4Zug:VkJmmaHrSnbjLTo8G4fbHPVDwL2fzW
Behavioral task
behavioral1
Sample
driving-v4.4.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
ahmyth
http://147.185.221.17:25603
Targets
-
-
Target
driving-v4.4.apk
-
Size
293KB
-
MD5
fd548aaf77ba7ce088c6945ef93a55c9
-
SHA1
257fb47afcad834a8d9691f9f2044bd77ed34b66
-
SHA256
0d9e79d8e22395fb952653b440c0bef36ea6fcd3536122044704b25030598769
-
SHA512
3149cb7141add77f7036cdf78e82dc94140d731c22425a8f6c103866360a50c76962748fb5f16b5f161fcb7ef71a981f230af1c2704a2bdb20ed2026c0b4ec70
-
SSDEEP
3072:VZeJmmaGOrkq72nb/Un0t2mFi9mp/t0uLL4Xa/G5b5oTfaAqG1ZjZaeeExgy4Zug:VkJmmaHrSnbjLTo8G4fbHPVDwL2fzW
-
Reads the contacts stored on the device.
-
Reads the content of SMS inbox messages.
-
Reads the content of the call log.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Tries to add a device administrator.
-