General
-
Target
rwbjmjigjv.apk
-
Size
205KB
-
Sample
201230-s9z6hjadhj
-
MD5
b46157e537fddb256f8ebf5965edd34b
-
SHA1
410e4332d470e764e13ab8016cf4cc23fb74f64e
-
SHA256
7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a
-
SHA512
6446d22573587e28cb67607954ad25221b0d9b03eb131acdb00dae66ecec3695557901fdf19b26417c387c1c9f57e87170a90f975cbdaf39008c96246849f67a
Static task
static1
Behavioral task
behavioral1
Sample
rwbjmjigjv.apk
Resource
android-x86_64_arm64
Malware Config
Extracted
Targets
-
-
Target
rwbjmjigjv.apk
-
Size
205KB
-
MD5
b46157e537fddb256f8ebf5965edd34b
-
SHA1
410e4332d470e764e13ab8016cf4cc23fb74f64e
-
SHA256
7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a
-
SHA512
6446d22573587e28cb67607954ad25221b0d9b03eb131acdb00dae66ecec3695557901fdf19b26417c387c1c9f57e87170a90f975cbdaf39008c96246849f67a
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-