Analysis
-
max time kernel
3874025s -
max time network
129s -
platform
android_x86_64 -
resource
android-x86_64 -
submitted
20-11-2020 18:26
Static task
static1
Behavioral task
behavioral1
Sample
1f43dceecb27f7bf132bef9c77fa87d63395d8bf3ef1e22d66c63fa57a96ff06.apk
Resource
android-x86_64
android_x86_64
0 signatures
0 seconds
General
-
Target
1f43dceecb27f7bf132bef9c77fa87d63395d8bf3ef1e22d66c63fa57a96ff06.apk
-
Size
1.2MB
-
MD5
10523698461fbe199643eca0433adcfe
-
SHA1
8ebf509d71e0617064d29ba2dfb5ed5a2d658f65
-
SHA256
1f43dceecb27f7bf132bef9c77fa87d63395d8bf3ef1e22d66c63fa57a96ff06
-
SHA512
ac8e31a7c6e388b6077dbb21f70bb95c7a7883dd679de0c3f2e67c763f96f93fe8b0e2e00462418c270f56e28bb6dbda9e8f7b2f27f3dd0d3f072591f59c323e
Score
10/10
Malware Config
Extracted
DES_key
DES_key
Signatures
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.xcsksjdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.xcsksj