General
-
Target
moa.apk
-
Size
6.2MB
-
Sample
210114-5tz18frvb2
-
MD5
05e59ac3d920a3b57a1e086a46d04501
-
SHA1
fc247025ce61518b5636754868d42a23ec16b0a7
-
SHA256
9db596bf58f59a3940fb1354d141cc1523c9945d84797f03919989945bb29390
-
SHA512
d4cb440e918c793e2cedb980f989a0730b3997782efc5f4c2777f2026364a8c66e89d57f8f67a5336ff13a99a39f4a0afc966792e01412f8d9faf9e091509408
Static task
static1
Behavioral task
behavioral1
Sample
moa.apk
Resource
android-x86_64
Malware Config
Targets
-
-
Target
moa.apk
-
Size
6.2MB
-
MD5
05e59ac3d920a3b57a1e086a46d04501
-
SHA1
fc247025ce61518b5636754868d42a23ec16b0a7
-
SHA256
9db596bf58f59a3940fb1354d141cc1523c9945d84797f03919989945bb29390
-
SHA512
d4cb440e918c793e2cedb980f989a0730b3997782efc5f4c2777f2026364a8c66e89d57f8f67a5336ff13a99a39f4a0afc966792e01412f8d9faf9e091509408
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Reads serial number of SIM
-