General
-
Target
yJuHrRdFtA.apk
-
Size
218KB
-
Sample
201121-axqe2s9nta
-
MD5
a6247c862bfeb6e3083bf2a81193426a
-
SHA1
f4a4ad1efe413b48a21f85e7f9fd1f57d104408a
-
SHA256
6447b808a2a99cf9f932ca731524a81e994824544e39cc3631870f7e66f6ff59
-
SHA512
bc0f7557d56c5343dc4435173a77518e57264a6693dfe9948094fe0ea03ac669feadd0818f7ab7dab7a5f45e0ad6cde41b902a84847f00db1dc8853f4684d26d
Static task
static1
Behavioral task
behavioral1
Sample
yJuHrRdFtA.apk
Resource
android-x86_64
Malware Config
Extracted
Targets
-
-
Target
yJuHrRdFtA.apk
-
Size
218KB
-
MD5
a6247c862bfeb6e3083bf2a81193426a
-
SHA1
f4a4ad1efe413b48a21f85e7f9fd1f57d104408a
-
SHA256
6447b808a2a99cf9f932ca731524a81e994824544e39cc3631870f7e66f6ff59
-
SHA512
bc0f7557d56c5343dc4435173a77518e57264a6693dfe9948094fe0ea03ac669feadd0818f7ab7dab7a5f45e0ad6cde41b902a84847f00db1dc8853f4684d26d
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-