General
-
Target
65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894.apk
-
Size
4.1MB
-
Sample
210928-ltakyabfbq
-
MD5
d070db0597d0e5231b561a92bda0aec1
-
SHA1
2aef7b1f2ec453489a3b4f5fde5d0bec2129fa05
-
SHA256
65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894
-
SHA512
2b9c6ba83d25d6f4f5791f0b7041bac04cb179e880a80884357504559dfcebffdea1e06c0f6bfe326f6e7ecd9863b7a6ad4f839d0626d20c540cdc16d860bcbb
Static task
static1
Behavioral task
behavioral1
Sample
65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894.apk
Resource
android-x86-arm
Malware Config
Targets
-
-
Target
65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894.apk
-
Size
4.1MB
-
MD5
d070db0597d0e5231b561a92bda0aec1
-
SHA1
2aef7b1f2ec453489a3b4f5fde5d0bec2129fa05
-
SHA256
65619e3afe53268f5cbe5eae6a429f23e712c4412eda8c70dcfd3ebb25382894
-
SHA512
2b9c6ba83d25d6f4f5791f0b7041bac04cb179e880a80884357504559dfcebffdea1e06c0f6bfe326f6e7ecd9863b7a6ad4f839d0626d20c540cdc16d860bcbb
-
Ermac Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-