General
-
Target
tmp0m42ypcg
-
Size
2.7MB
-
Sample
210113-t7aghkkkwn
-
MD5
76b35e470d17120bbd541c9e3b160ddf
-
SHA1
feb35078107586c403adb046c48ecd23d0e6d22f
-
SHA256
cb2aa894755825306671f2cfd4b76aa052d83dcf2a5f9d7c15887e040ab6e0d0
-
SHA512
ad989e77eabdb53d6f4522b8aeb160d27dc0d822c86f6036ccb8da863229fc21eced4451db67b0f3aca65d78b886763df18354d6bd74c644a30838d5c54d5cff
Static task
static1
Behavioral task
behavioral1
Sample
tmp0m42ypcg.apk
Resource
android-x86_arm
Malware Config
Targets
-
-
Target
tmp0m42ypcg
-
Size
2.7MB
-
MD5
76b35e470d17120bbd541c9e3b160ddf
-
SHA1
feb35078107586c403adb046c48ecd23d0e6d22f
-
SHA256
cb2aa894755825306671f2cfd4b76aa052d83dcf2a5f9d7c15887e040ab6e0d0
-
SHA512
ad989e77eabdb53d6f4522b8aeb160d27dc0d822c86f6036ccb8da863229fc21eced4451db67b0f3aca65d78b886763df18354d6bd74c644a30838d5c54d5cff
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-