General
-
Target
bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1.apk
-
Size
4.2MB
-
Sample
210915-hm5kysaac3
-
MD5
6630b2e0d7430b6dc63705c471c442c4
-
SHA1
f8bda4328d63f3d90fc862d82ce797de09f45245
-
SHA256
bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1
-
SHA512
c8a34d76ef4a3c9a023db15eb54d6ee04bc360624f4e3ff8c8e2e298deb0cf8ad068cf8615dd50f30c15a58d10e7357edfed6a1ba33c3ee8c954abb6906c2b67
Static task
static1
Behavioral task
behavioral1
Sample
bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1.apk
-
Size
4.2MB
-
MD5
6630b2e0d7430b6dc63705c471c442c4
-
SHA1
f8bda4328d63f3d90fc862d82ce797de09f45245
-
SHA256
bd889272696244e9baa8322d6b7151873a121518969f3986020b623be4ccf0c1
-
SHA512
c8a34d76ef4a3c9a023db15eb54d6ee04bc360624f4e3ff8c8e2e298deb0cf8ad068cf8615dd50f30c15a58d10e7357edfed6a1ba33c3ee8c954abb6906c2b67
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-