General
-
Target
cwutqjvwcx.apk
-
Size
205KB
-
Sample
210120-2rzat5cvzj
-
MD5
daaa6d12b45614c04ece14bca45578d6
-
SHA1
bd314cbb03a40a01e0d27a967d4238dafc6607d5
-
SHA256
9b42ce8daebc808e7f2805443c93f44647badf32f0378d6267a2e6a18bd5c46a
-
SHA512
dd25f8525cc097f1e116331cde41e6cd4cc931a01af2ec7caeb2fb775ee4ea4849212dc3821d47dbf415aa9c2a77f21aac15344c206930902e8f41856de3ae31
Static task
static1
Behavioral task
behavioral1
Sample
cwutqjvwcx.apk
Resource
android-x86_64_arm64
Malware Config
Extracted
Targets
-
-
Target
cwutqjvwcx.apk
-
Size
205KB
-
MD5
daaa6d12b45614c04ece14bca45578d6
-
SHA1
bd314cbb03a40a01e0d27a967d4238dafc6607d5
-
SHA256
9b42ce8daebc808e7f2805443c93f44647badf32f0378d6267a2e6a18bd5c46a
-
SHA512
dd25f8525cc097f1e116331cde41e6cd4cc931a01af2ec7caeb2fb775ee4ea4849212dc3821d47dbf415aa9c2a77f21aac15344c206930902e8f41856de3ae31
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-