General
-
Target
bawag.apk
-
Size
6.1MB
-
Sample
220203-l4xs8afcbl
-
MD5
f0db0430dc99ea4ec1099d7511f1677d
-
SHA1
49f57f37ae162de72603b0aecc0b5979133819d2
-
SHA256
a7f6a3bdcc8049e70ee08fa5e67966e83f6624b0231024dc20eeaad948307681
-
SHA512
54c00ed3d0444a15b732e7427a1aa675803140e8ee4b183f311c075e2395e04d52bef5648d107e1ccf0002fe2d2e8990a118c3cf0a446a21ce13a0009821c41c
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
bawag.apk
-
Size
6.1MB
-
MD5
f0db0430dc99ea4ec1099d7511f1677d
-
SHA1
49f57f37ae162de72603b0aecc0b5979133819d2
-
SHA256
a7f6a3bdcc8049e70ee08fa5e67966e83f6624b0231024dc20eeaad948307681
-
SHA512
54c00ed3d0444a15b732e7427a1aa675803140e8ee4b183f311c075e2395e04d52bef5648d107e1ccf0002fe2d2e8990a118c3cf0a446a21ce13a0009821c41c
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-