General
-
Target
ipskspawib.apk
-
Size
208KB
-
Sample
210301-fpvz7cyg9s
-
MD5
e574f63d347c077f0563ce347656a99f
-
SHA1
813cdf8391d80a256cdda5e8a204c5bb6ca6f912
-
SHA256
05789f84ddbb1dc6ac423cb174abbaa78f12b4d25e353901a2c823e9be1c1a3b
-
SHA512
d75ac80d463a465d7d2142ebfab26e432f38be381f46ed7463cd22cc48ce48bb2deff1494130b0a9e9f05d3d8bcb9b59e445e7152459538630118a703ab7c155
Static task
static1
Behavioral task
behavioral1
Sample
ipskspawib.apk
Resource
android-x86_64_arm64
Malware Config
Extracted
Targets
-
-
Target
ipskspawib.apk
-
Size
208KB
-
MD5
e574f63d347c077f0563ce347656a99f
-
SHA1
813cdf8391d80a256cdda5e8a204c5bb6ca6f912
-
SHA256
05789f84ddbb1dc6ac423cb174abbaa78f12b4d25e353901a2c823e9be1c1a3b
-
SHA512
d75ac80d463a465d7d2142ebfab26e432f38be381f46ed7463cd22cc48ce48bb2deff1494130b0a9e9f05d3d8bcb9b59e445e7152459538630118a703ab7c155
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-