General
-
Target
7f199a0afda7936c7fa74f9a7614640f12fcfb46e350111bce359964e164adae
-
Size
13.2MB
-
Sample
210303-wz5vqzmpfn
-
MD5
0d1df5c35c3c43e1b8bb7daec2495c06
-
SHA1
d5f2c4659648098acb87811bcdd9fc8814d2e4fd
-
SHA256
7f199a0afda7936c7fa74f9a7614640f12fcfb46e350111bce359964e164adae
-
SHA512
fc40838367f214acbe2961eab55845bd9e08e0e49fb9720c5952ca23bd1cd6391051774b984cc343cd5eb337d1f3184fe40eabc28437e0b56f95abb94d3eeea1
Static task
static1
Behavioral task
behavioral1
Sample
7f199a0afda7936c7fa74f9a7614640f12fcfb46e350111bce359964e164adae.apk
Resource
android-x86_arm
Behavioral task
behavioral2
Sample
7f199a0afda7936c7fa74f9a7614640f12fcfb46e350111bce359964e164adae.apk
Resource
android-x86_64
Malware Config
Extracted
Targets
-
-
Target
7f199a0afda7936c7fa74f9a7614640f12fcfb46e350111bce359964e164adae
-
Size
13.2MB
-
MD5
0d1df5c35c3c43e1b8bb7daec2495c06
-
SHA1
d5f2c4659648098acb87811bcdd9fc8814d2e4fd
-
SHA256
7f199a0afda7936c7fa74f9a7614640f12fcfb46e350111bce359964e164adae
-
SHA512
fc40838367f214acbe2961eab55845bd9e08e0e49fb9720c5952ca23bd1cd6391051774b984cc343cd5eb337d1f3184fe40eabc28437e0b56f95abb94d3eeea1
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-