General
-
Target
xcejgqilan.apk
-
Size
205KB
-
Sample
210117-yzgr1acfsn
-
MD5
11f00bf6879962c2a47cf3ac941036ea
-
SHA1
8ce41bf486fede24004aadc8495c339c7ca06484
-
SHA256
7886433ed316d47a88323499397e698f560f75689c0c5ce93efb2fd1bc8ece09
-
SHA512
b49eb7e9aaba2bd8e599ece317a50945bf725b87bb3e62f273a21c31a28d9a0b46ad968691189e784960de624dd6903dd9eb5cb9bc587e79c4409272d4fc3500
Static task
static1
Behavioral task
behavioral1
Sample
xcejgqilan.apk
Resource
android-x86_64
Malware Config
Extracted
Targets
-
-
Target
xcejgqilan.apk
-
Size
205KB
-
MD5
11f00bf6879962c2a47cf3ac941036ea
-
SHA1
8ce41bf486fede24004aadc8495c339c7ca06484
-
SHA256
7886433ed316d47a88323499397e698f560f75689c0c5ce93efb2fd1bc8ece09
-
SHA512
b49eb7e9aaba2bd8e599ece317a50945bf725b87bb3e62f273a21c31a28d9a0b46ad968691189e784960de624dd6903dd9eb5cb9bc587e79c4409272d4fc3500
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-