General
-
Target
dtgkbtpiqs.apk
-
Size
205KB
-
Sample
210119-m7nm4njfzn
-
MD5
347bc46d7661929f72a82753d23b42a6
-
SHA1
e296153e0ce19473c0d63697bab67e5b42a22c18
-
SHA256
30912ef8314f01b4c78829baf87aa8624722e9b3b371b007b6dfc9a0e79a3782
-
SHA512
74d57b235551064abdab0907109339c77de77b0f849ebeb904f6a61aa0fee0de39725d9a26348b02977d2349737fe97b92cf498fc0070a4513d0413f1e3619b4
Static task
static1
Behavioral task
behavioral1
Sample
dtgkbtpiqs.apk
Resource
android-x86_64
Malware Config
Extracted
Targets
-
-
Target
dtgkbtpiqs.apk
-
Size
205KB
-
MD5
347bc46d7661929f72a82753d23b42a6
-
SHA1
e296153e0ce19473c0d63697bab67e5b42a22c18
-
SHA256
30912ef8314f01b4c78829baf87aa8624722e9b3b371b007b6dfc9a0e79a3782
-
SHA512
74d57b235551064abdab0907109339c77de77b0f849ebeb904f6a61aa0fee0de39725d9a26348b02977d2349737fe97b92cf498fc0070a4513d0413f1e3619b4
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-