General
-
Target
6382941684662272.zip
-
Size
7.3MB
-
Sample
210621-vqxkj241tx
-
MD5
fcdf4d8a9cda7fd8fb1ac16f33dcc5e9
-
SHA1
cc2ab0c57ceb7c0ac704a685e4dbc53e9b2ef103
-
SHA256
f9ff002795f2c795f55d073e693be33b7de0d92d594b956e2187f0c58d942634
-
SHA512
31b517088ef573d4e399fef0c12d6af9458e8f2ea80d5ee28d4e61e32f81fee0024d6c7c437fcc1210b9d212dddf1eeb4003f7f0a7dbcb6caf82042fe9f5b744
Static task
static1
Behavioral task
behavioral1
Sample
e609ac709a6b80b0ceb58c646735fc597db0483ff637e93acf9be028c07900d7.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
e609ac709a6b80b0ceb58c646735fc597db0483ff637e93acf9be028c07900d7
-
Size
7.8MB
-
MD5
31c636b5155f9c6bf71bd5c279947a88
-
SHA1
7bf98935db59ffbdedf2fc85a6d04901608c85bc
-
SHA256
e609ac709a6b80b0ceb58c646735fc597db0483ff637e93acf9be028c07900d7
-
SHA512
5694d4ac85defeb91c63b01d724239eb9207f981d54aeda93b940893bae6f56cddbf28e291130b802cf26f57a27a78dcbb8cbb9d1bde5be0a2121f9c6a902eeb
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-