GroDDViewer: Zagruski

Sample name: zagruski

Malware Family

Premium SMS sending

Sample description:

The application send surcharged SMS during its setup. The following surcharged numbers are hardcoded in the .apk. The numbers caught are 5373, 7250, 7099 and 7030.

File details:

  • MD5 : ffa059488ba64ecb7d26b6d241aeec41
  • SHA256 : a63fea891e1d97fb1a1b953def12ca71b816b94ca82fadf394614f5a91a47a13
  • Size : 11.8 KB
View mode
System Flow Graph
Type: Group: Socket: .db-shm: .txt: .xml: .tmp: .sqlite-journal: .sqlite: .db-journal: .apk: .db-wal: .shaders_cache: .db: .db-shm: .txt: .xml: .tmp: .sqlite-journal: .sqlite: .db-journal: .apk: .db-wal: .shaders_cache: .db:
Grid Layout
Nb processes:

  • Graph legend
  • process
  • file
  • socket
Interactions frequency and zoom on time intervals
Min: 0 | Max: 1000 |
Current: 0
Speed: 500