General
-
Target
spo.apk
-
Size
7.8MB
-
Sample
210609-ltga5f4h9a
-
MD5
31c636b5155f9c6bf71bd5c279947a88
-
SHA1
7bf98935db59ffbdedf2fc85a6d04901608c85bc
-
SHA256
e609ac709a6b80b0ceb58c646735fc597db0483ff637e93acf9be028c07900d7
-
SHA512
5694d4ac85defeb91c63b01d724239eb9207f981d54aeda93b940893bae6f56cddbf28e291130b802cf26f57a27a78dcbb8cbb9d1bde5be0a2121f9c6a902eeb
Static task
static1
Behavioral task
behavioral1
Sample
spo.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
spo.apk
-
Size
7.8MB
-
MD5
31c636b5155f9c6bf71bd5c279947a88
-
SHA1
7bf98935db59ffbdedf2fc85a6d04901608c85bc
-
SHA256
e609ac709a6b80b0ceb58c646735fc597db0483ff637e93acf9be028c07900d7
-
SHA512
5694d4ac85defeb91c63b01d724239eb9207f981d54aeda93b940893bae6f56cddbf28e291130b802cf26f57a27a78dcbb8cbb9d1bde5be0a2121f9c6a902eeb
Score7/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-