Analysis
-
max time kernel
2573902s -
platform
android_x86 -
resource
android-x86-arm -
submitted
19-10-2021 16:37
Static task
static1
Behavioral task
behavioral1
Sample
6efba672aed4b91837758ee91b5c7bdc632cabd64df923fc702b5de24159bf19.apk
Resource
android-x86-arm
android_x86
0 signatures
0 seconds
General
-
Target
6efba672aed4b91837758ee91b5c7bdc632cabd64df923fc702b5de24159bf19.apk
-
Size
6.3MB
-
MD5
f990e3040e13821787b24d8b70211171
-
SHA1
42420b60bde4b052be9658e1c82451592ee15da8
-
SHA256
6efba672aed4b91837758ee91b5c7bdc632cabd64df923fc702b5de24159bf19
-
SHA512
e52c4977f7bbe3cc858398cbe44c54aa654702aaa61a348df95b044a3797c753cb535bc64cb9c5183e48bccc48e5c61c7ad5b15f38fe638bb2509e89c540cc9f
Score
6/10
Malware Config
Signatures
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.aio.downloaderdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.aio.downloader