General
-
Target
xbafaaflpk.apk
-
Size
204KB
-
Sample
210117-2t1gv3dzsj
-
MD5
4c976607cb1d0c0f3f082ef8dac8f22e
-
SHA1
98e053c1e63f17622e38d3798f5e65e544e9b490
-
SHA256
84dace68c129c0babe472e1a14c3fc95e8349cc2854f536ff3e53b0a394cbd2f
-
SHA512
1082f6c45b16e990b288a81aa974f73a669b331cc0a34ee7511ca3f45322ee9159dffafab520855620e8ffe744e25e9c8b228a58eb0bb8ee62b36e40dfef9e5d
Static task
static1
Behavioral task
behavioral1
Sample
xbafaaflpk.apk
Resource
android-x86_64_arm64
Malware Config
Extracted
Targets
-
-
Target
xbafaaflpk.apk
-
Size
204KB
-
MD5
4c976607cb1d0c0f3f082ef8dac8f22e
-
SHA1
98e053c1e63f17622e38d3798f5e65e544e9b490
-
SHA256
84dace68c129c0babe472e1a14c3fc95e8349cc2854f536ff3e53b0a394cbd2f
-
SHA512
1082f6c45b16e990b288a81aa974f73a669b331cc0a34ee7511ca3f45322ee9159dffafab520855620e8ffe744e25e9c8b228a58eb0bb8ee62b36e40dfef9e5d
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-