General
-
Target
ucbcbayeup.apk
-
Size
205KB
-
Sample
210122-zfwbz1jyhj
-
MD5
bfb1346a8160b6e7f15229fb009fddd6
-
SHA1
12da5ac817e1eec0c095ce1417f51b8eced592c1
-
SHA256
647767c8c6f05e71b95e3dcb00d229df4772ffbd858aaa23381e3cce089b2915
-
SHA512
0c483d44aebfa86f64dbb70d2bc83923edcefa0fa08de4b4f8533edbd45ce4f23df0549dcf5e23fe5732926cfd6a16c889ca26ebc2ee7a84ee41db4e0f965423
Static task
static1
Behavioral task
behavioral1
Sample
ucbcbayeup.apk
Resource
android-x86_64
Malware Config
Extracted
Targets
-
-
Target
ucbcbayeup.apk
-
Size
205KB
-
MD5
bfb1346a8160b6e7f15229fb009fddd6
-
SHA1
12da5ac817e1eec0c095ce1417f51b8eced592c1
-
SHA256
647767c8c6f05e71b95e3dcb00d229df4772ffbd858aaa23381e3cce089b2915
-
SHA512
0c483d44aebfa86f64dbb70d2bc83923edcefa0fa08de4b4f8533edbd45ce4f23df0549dcf5e23fe5732926cfd6a16c889ca26ebc2ee7a84ee41db4e0f965423
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-