General
-
Target
iJjTgLzYsFgDrRy.apk
-
Size
218KB
-
Sample
201122-rq558bfw7a
-
MD5
bfa8485aba16ecca0ad2504f27ff46b5
-
SHA1
a7e7a0d42d7e5635e803c0f913565fc93e714ebc
-
SHA256
5c3126752ea0c6d395b2c73ddb75e20c7719feb685b8082cbc00ff41665013f3
-
SHA512
6672533bd45e578000cbbbfbe97027e33990f09446a67e9960bd4c2788862aa8af810d54270d617508a8fcb09f32694524818fa60524492abb96271b29b5fd1e
Static task
static1
Behavioral task
behavioral1
Sample
iJjTgLzYsFgDrRy.apk
Resource
android-x86_arm
Malware Config
Extracted
Targets
-
-
Target
iJjTgLzYsFgDrRy.apk
-
Size
218KB
-
MD5
bfa8485aba16ecca0ad2504f27ff46b5
-
SHA1
a7e7a0d42d7e5635e803c0f913565fc93e714ebc
-
SHA256
5c3126752ea0c6d395b2c73ddb75e20c7719feb685b8082cbc00ff41665013f3
-
SHA512
6672533bd45e578000cbbbfbe97027e33990f09446a67e9960bd4c2788862aa8af810d54270d617508a8fcb09f32694524818fa60524492abb96271b29b5fd1e
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-