General
-
Target
dAdYrNg.apk
-
Size
218KB
-
Sample
201207-xrcftba5rx
-
MD5
cce6059446540919706260279c204608
-
SHA1
8aa0055a0d8c782204dbaccfc99545d2eb89d67d
-
SHA256
7d4d00a1ed508db997d98bc9bda0e9ed4e5115f5898b93f71ced5a1a92e44b6d
-
SHA512
b31dc057d12d5df5849f24ac00483529477b0e7beda1e43ff066798e42e7a33b28b5aed30073d184cbbdc9b6c839ca1de8000d49f4a7c9edf1c0a55eafde2e7d
Static task
static1
Behavioral task
behavioral1
Sample
dAdYrNg.apk
Resource
android-x86_64_arm64
Malware Config
Extracted
Targets
-
-
Target
dAdYrNg.apk
-
Size
218KB
-
MD5
cce6059446540919706260279c204608
-
SHA1
8aa0055a0d8c782204dbaccfc99545d2eb89d67d
-
SHA256
7d4d00a1ed508db997d98bc9bda0e9ed4e5115f5898b93f71ced5a1a92e44b6d
-
SHA512
b31dc057d12d5df5849f24ac00483529477b0e7beda1e43ff066798e42e7a33b28b5aed30073d184cbbdc9b6c839ca1de8000d49f4a7c9edf1c0a55eafde2e7d
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-