General
-
Target
nhc2.0.apk
-
Size
6.7MB
-
Sample
201120-4bsfa33nkj
-
MD5
f84aa3c1612db042ada1a1828c4a793a
-
SHA1
8dc402560c79345e3078183cc058ae1503cc41c3
-
SHA256
9f18d696db294adf3fedcf2d0a0ab511d1b2bf1e569626ea0d84f4c7fd54db6d
-
SHA512
3521ddfdab300d04e66f88010d869ab354b6166af83bf578516e7de599a4adb2f052f218485b1eafc60b199da44da187ede852bfb568dde85272cb93e66107f9
Static task
static1
Behavioral task
behavioral1
Sample
nhc2.0.apk
Resource
android-x86_arm
Malware Config
Extracted
Targets
-
-
Target
nhc2.0.apk
-
Size
6.7MB
-
MD5
f84aa3c1612db042ada1a1828c4a793a
-
SHA1
8dc402560c79345e3078183cc058ae1503cc41c3
-
SHA256
9f18d696db294adf3fedcf2d0a0ab511d1b2bf1e569626ea0d84f4c7fd54db6d
-
SHA512
3521ddfdab300d04e66f88010d869ab354b6166af83bf578516e7de599a4adb2f052f218485b1eafc60b199da44da187ede852bfb568dde85272cb93e66107f9
Score10/10-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-