General
-
Target
tmp869ae3yn
-
Size
2.0MB
-
Sample
210113-wvr8cyj8wj
-
MD5
0204df0b02c9fbf18751c829c0a0990a
-
SHA1
75d433e3a4d95a946eee1e6a9c6d1bf033aad5a3
-
SHA256
db329505e2425bc20c329e58698f70408d5221f3816326fdc5ad0feb336310d8
-
SHA512
cdc2071a732e7a8588719b07a807842a069a8e9807f75118c32f2b74b841b4bd9fc76bae200aa18a87b25f298caa2e1af405e6ccfc204e9410b2179f138520e9
Static task
static1
Behavioral task
behavioral1
Sample
tmp869ae3yn.apk
Resource
android-x86_64
Malware Config
Targets
-
-
Target
tmp869ae3yn
-
Size
2.0MB
-
MD5
0204df0b02c9fbf18751c829c0a0990a
-
SHA1
75d433e3a4d95a946eee1e6a9c6d1bf033aad5a3
-
SHA256
db329505e2425bc20c329e58698f70408d5221f3816326fdc5ad0feb336310d8
-
SHA512
cdc2071a732e7a8588719b07a807842a069a8e9807f75118c32f2b74b841b4bd9fc76bae200aa18a87b25f298caa2e1af405e6ccfc204e9410b2179f138520e9
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-