General
-
Target
iHgLcHoBlFtG.apk
-
Size
218KB
-
Sample
201123-hse2jbr4ae
-
MD5
af3565659399767250b6a92d7588a6c6
-
SHA1
6606e69a3d07ade51066f22d98e19ce6ab59b1d2
-
SHA256
c24c3c7ab8706e65afa88599e293632f47d34415a5b13447a2f3ced09f8a903a
-
SHA512
b0daeb707f954a5c066be333480abe35e845ade9f22c7cd6d25ebd8482ecd53bf4c31a050c0c40a7139bcae07bdbc051b0b36854e148500105029f5401aa07b4
Static task
static1
Behavioral task
behavioral1
Sample
iHgLcHoBlFtG.apk
Resource
android-x86_64
Malware Config
Extracted
Targets
-
-
Target
iHgLcHoBlFtG.apk
-
Size
218KB
-
MD5
af3565659399767250b6a92d7588a6c6
-
SHA1
6606e69a3d07ade51066f22d98e19ce6ab59b1d2
-
SHA256
c24c3c7ab8706e65afa88599e293632f47d34415a5b13447a2f3ced09f8a903a
-
SHA512
b0daeb707f954a5c066be333480abe35e845ade9f22c7cd6d25ebd8482ecd53bf4c31a050c0c40a7139bcae07bdbc051b0b36854e148500105029f5401aa07b4
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-