General
-
Target
arsezudnmo.apk
-
Size
206KB
-
Sample
201219-c7ryd6cvxa
-
MD5
63b113e6499161d359623320788c7376
-
SHA1
8ac1f83b21b1158081dcd6ff0bb9351cf0d3676e
-
SHA256
0cc3defcfeb3bc8dfdd9699417522479b866b84dbb4cf5a52f0202f70151b3f4
-
SHA512
4974971814f1f9843cee0742656ce2d4e66a5350a37e73176574cfff0ef00ed42983d42d765f21ad5cab6520086c3da265ec263efc20c48db0b8b1fd885433bf
Static task
static1
Behavioral task
behavioral1
Sample
arsezudnmo.apk
Resource
android-x86_64_arm64
Malware Config
Extracted
Targets
-
-
Target
arsezudnmo.apk
-
Size
206KB
-
MD5
63b113e6499161d359623320788c7376
-
SHA1
8ac1f83b21b1158081dcd6ff0bb9351cf0d3676e
-
SHA256
0cc3defcfeb3bc8dfdd9699417522479b866b84dbb4cf5a52f0202f70151b3f4
-
SHA512
4974971814f1f9843cee0742656ce2d4e66a5350a37e73176574cfff0ef00ed42983d42d765f21ad5cab6520086c3da265ec263efc20c48db0b8b1fd885433bf
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-