General
-
Target
AndrodYazlm.apk
-
Size
3.4MB
-
Sample
210730-elr4nmgy4j
-
MD5
7a878c0c85c846a2d65de3cae8ad836f
-
SHA1
21757800efeafa642d40d89f4d55c3af6428d64b
-
SHA256
39d3fc9a1f49d010494b593250637ffdafdc89975a86e4e4d44d861e4515f953
-
SHA512
6c30accaec118485b84eca10369c47fe7dd54cabb6abd01b1b8a24fa02d31ace440c7db47098cf2b6a30b6d65460dd012fa90b3e5e6b31918084b0fc39cecd44
Static task
static1
Behavioral task
behavioral1
Sample
AndrodYazlm.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
AndrodYazlm.apk
Resource
android-x64-arm64
Behavioral task
behavioral3
Sample
AndrodYazlm.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
AndrodYazlm.apk
-
Size
3.4MB
-
MD5
7a878c0c85c846a2d65de3cae8ad836f
-
SHA1
21757800efeafa642d40d89f4d55c3af6428d64b
-
SHA256
39d3fc9a1f49d010494b593250637ffdafdc89975a86e4e4d44d861e4515f953
-
SHA512
6c30accaec118485b84eca10369c47fe7dd54cabb6abd01b1b8a24fa02d31ace440c7db47098cf2b6a30b6d65460dd012fa90b3e5e6b31918084b0fc39cecd44
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-