File name:

Plus followers 4 7.6.apk

Full analysis: https://app.any.run/tasks/8434bf86-ad20-4c4e-a6b7-c802e1a1732e
Verdict: Malicious activity
Analysis date: July 26, 2025, 09:59:57
OS: Android 14
MIME: application/vnd.android.package-archive
File info: Android package (APK), with AndroidManifest.xml, with APK Signing Block
MD5:

EBCA0D5AB521565D3C5A8D2DA1FDCA92

SHA1:

5249AEAF4321050E06C0937976ED9A7A242432CF

SHA256:

D21577CAB361F8FC0E6E23EAE7483E6FF3D151D10CD12CAFDB4A1AF2BF29EE42

SSDEEP:

98304:3+LRBeAHbh5+VjfKUJBKZKc35TQiXRBkRbIp/W6rSCSKjR3DnQoFFk3zwplSNIKI:Wmc5lLlPOZgzatp6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Hides app icon from display

      • app_process64 (PID: 2286)
    • Detects root access on device

      • app_process64 (PID: 2286)
      • app_process64 (PID: 2517)
  • SUSPICIOUS

    • Returns the name of the current network operator

      • app_process64 (PID: 2286)
      • app_process64 (PID: 2517)
    • Collects data about the device's environment (JVM version)

      • app_process64 (PID: 2286)
      • app_process64 (PID: 2517)
    • Updates data in the storage of application settings (SharedPreferences)

      • app_process64 (PID: 2517)
      • app_process64 (PID: 2286)
    • Launches a new activity

      • app_process64 (PID: 2286)
    • Accesses system-level resources

      • app_process64 (PID: 2517)
      • app_process64 (PID: 2286)
    • Establishing a connection

      • app_process64 (PID: 2517)
      • app_process64 (PID: 2286)
    • Sets file permissions, owner, and group for a specified path

      • app_process64 (PID: 2517)
    • Acquires a wake lock to keep the device awake

      • app_process64 (PID: 2286)
    • Creates a WakeLock to manage power state

      • app_process64 (PID: 2286)
  • INFO

    • Dynamically inspects or modifies classes, methods, and fields at runtime

      • app_process64 (PID: 2286)
      • app_process64 (PID: 2517)
    • Returns elapsed time since boot

      • app_process64 (PID: 2286)
      • app_process64 (PID: 2517)
    • Retrieves data from storage of application settings (SharedPreferences)

      • app_process64 (PID: 2286)
      • app_process64 (PID: 2517)
    • Stores data using SQLite database

      • app_process64 (PID: 2286)
      • app_process64 (PID: 2517)
    • Verifies whether the device is connected to the internet

      • app_process64 (PID: 2286)
      • app_process64 (PID: 2517)
    • Dynamically registers broadcast event listeners

      • app_process64 (PID: 2286)
    • Dynamically loads a class in Java

      • app_process64 (PID: 2286)
    • Gets the display metrics associated with the device's screen

      • app_process64 (PID: 2286)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.apk | Android Package (62.8)
.jar | Java Archive (17.3)
.vym | VYM Mind Map (14.9)
.zip | ZIP compressed archive (4.7)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0002
ZipCompression: Deflated
ZipModifyDate: 2023:01:15 20:46:24
ZipCRC: 0x33eb00df
ZipCompressedSize: 5851
ZipUncompressedSize: 30056
ZipFileName: AndroidManifest.xml
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start app_process64 app_process64 no specs app_process64 no specs app_process64 app_process64

Process information

PID
CMD
Path
Indicators
Parent process
2286com.tripchoni.plusfollowers4 /system/bin/app_process64
app_process64
User:
root
Integrity Level:
UNKNOWN
Exit code:
9
2412<pre-initialized> /system/bin/app_process64app_process64
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
2435webview_zygote /system/bin/app_process64app_process64
User:
webview_zygote
Integrity Level:
UNKNOWN
Exit code:
0
2482com.android.providers.media.module /system/bin/app_process64
app_process64
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
2517com.tripchoni.plusfollowers4 /system/bin/app_process64
app_process64
User:
root
Integrity Level:
UNKNOWN
Exit code:
0
Total events
0
Read events
0
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
33
Text files
36
Unknown types
0

Dropped files

PID
Process
Filename
Type
2286app_process64/data/data/com.tripchoni.plusfollowers4/databases/androidx.work.workdb-journalbinary
MD5:
SHA256:
2286app_process64/data/data/com.tripchoni.plusfollowers4/shared_prefs/com.google.firebase.inappmessaging.xmlxml
MD5:
SHA256:
2286app_process64/data/data/com.tripchoni.plusfollowers4/databases/androidx.work.workdb-walbinary
MD5:
SHA256:
2286app_process64/data/data/com.tripchoni.plusfollowers4/shared_prefs/com.google.android.gms.measurement.prefs.xmlxml
MD5:
SHA256:
2286app_process64/data/data/com.tripchoni.plusfollowers4/files/PersistedInstallation1666952242759166254tmpbinary
MD5:
SHA256:
2286app_process64/data/data/com.tripchoni.plusfollowers4/files/PersistedInstallation.W0RFRkFVTFRd+MTo5OTY2OTI4MDkwNzA6YW5kcm9pZDpkOTI1NzhiYTJhYThlMGM2NzYxZDdm.jsonbinary
MD5:
SHA256:
2286app_process64/data/data/com.tripchoni.plusfollowers4/shared_prefs/FirebaseAppHeartBeat.xmlxml
MD5:
SHA256:
2286app_process64/data/data/com.tripchoni.plusfollowers4/shared_prefs/GTPlayerPurchases.xmlxml
MD5:
SHA256:
2286app_process64/data/data/com.tripchoni.plusfollowers4/files/PersistedInstallation2761605559854544342tmpbinary
MD5:
SHA256:
2286app_process64/data/data/com.tripchoni.plusfollowers4/shared_prefs/OneSignalTriggers.xmlxml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
14
DNS requests
12
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
172.217.16.131:80
http://connectivitycheck.gstatic.com/generate_204
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
445
mdnsd
224.0.0.251:5353
unknown
216.239.35.12:123
time.android.com
whitelisted
172.217.16.131:80
connectivitycheck.gstatic.com
GOOGLE
US
whitelisted
142.250.185.68:443
www.google.com
GOOGLE
US
whitelisted
142.250.27.81:443
staging-remoteprovisioning.sandbox.googleapis.com
GOOGLE
US
whitelisted
2286
app_process64
104.17.111.223:443
api.onesignal.com
CLOUDFLARENET
whitelisted
2286
app_process64
142.250.185.138:443
firebaseinstallations.googleapis.com
GOOGLE
US
whitelisted
2482
app_process64
172.217.16.195:443
update.googleapis.com
GOOGLE
US
whitelisted
2482
app_process64
34.104.35.123:443
edgedl.me.gvt1.com
GOOGLE
US
whitelisted
2482
app_process64
142.250.185.110:443
dl.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
connectivitycheck.gstatic.com
  • 172.217.16.131
whitelisted
www.google.com
  • 142.250.185.68
whitelisted
time.android.com
  • 216.239.35.12
  • 216.239.35.4
  • 216.239.35.0
  • 216.239.35.8
whitelisted
staging-remoteprovisioning.sandbox.googleapis.com
  • 142.250.27.81
whitelisted
api.onesignal.com
  • 104.17.111.223
  • 104.16.160.145
whitelisted
firebaseinstallations.googleapis.com
  • 142.250.185.138
  • 142.250.184.202
  • 216.58.206.42
  • 142.250.186.138
  • 142.250.186.170
  • 142.250.185.74
  • 142.250.186.106
  • 142.250.186.74
  • 172.217.18.106
  • 142.250.184.234
  • 142.250.181.234
  • 172.217.16.202
  • 216.58.206.74
  • 142.250.186.42
  • 172.217.18.10
  • 172.217.23.106
whitelisted
firebaseinappmessaging.googleapis.com
  • 142.250.185.138
  • 142.250.186.106
  • 142.250.185.106
  • 142.250.186.170
  • 216.58.206.42
  • 142.250.184.202
  • 142.250.185.202
  • 142.250.185.74
  • 142.250.186.138
  • 142.250.185.234
  • 142.250.185.170
  • 142.250.181.234
  • 172.217.16.202
  • 142.250.186.42
  • 172.217.23.106
  • 142.250.186.74
whitelisted
update.googleapis.com
  • 172.217.16.195
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO Android Device Connectivity Check
No debug info