General
-
Target
dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165.apk
-
Size
2.9MB
-
Sample
210910-nsawesdbcl
-
MD5
1698651d6b8fd95574f62b046b4f68e5
-
SHA1
ed0558bbfd7929cb4a28d6b095f68f26fcea4370
-
SHA256
dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165
-
SHA512
74d932cda56d661ade9dbf4ebcb0c092bee262a5475eded9b98010d00a97cbb6dc2083948e6ca568b238c1a801e52f096df35daa76160bfa8683bab41eb046a9
Static task
static1
Behavioral task
behavioral1
Sample
dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165.apk
Resource
android-x64
Malware Config
Targets
-
-
Target
dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165.apk
-
Size
2.9MB
-
MD5
1698651d6b8fd95574f62b046b4f68e5
-
SHA1
ed0558bbfd7929cb4a28d6b095f68f26fcea4370
-
SHA256
dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165
-
SHA512
74d932cda56d661ade9dbf4ebcb0c092bee262a5475eded9b98010d00a97cbb6dc2083948e6ca568b238c1a801e52f096df35daa76160bfa8683bab41eb046a9
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-