General
-
Target
psk.apk
-
Size
7.1MB
-
Sample
220301-rl99gsbhaq
-
MD5
975f5eff0e960994608742678ca70208
-
SHA1
e311d4f346b363665c462658889ddfb73c4dd8da
-
SHA256
64d0257352222162db7125f27e4ef16958c515326adab554d50698a1685e46ef
-
SHA512
7a2fbbb412504f431d6fdbd1f3390ab725eb7cd5ae37afaccf604d0d329ab6cecba45c90d48ef722a680026eac13356987ba4fdf85845c2cb689f0fce8119622
Static task
static1
Behavioral task
behavioral1
Sample
psk.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
psk.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
psk.apk
Resource
android-x64-arm64
Malware Config
Targets
-
-
Target
psk.apk
-
Size
7.1MB
-
MD5
975f5eff0e960994608742678ca70208
-
SHA1
e311d4f346b363665c462658889ddfb73c4dd8da
-
SHA256
64d0257352222162db7125f27e4ef16958c515326adab554d50698a1685e46ef
-
SHA512
7a2fbbb412504f431d6fdbd1f3390ab725eb7cd5ae37afaccf604d0d329ab6cecba45c90d48ef722a680026eac13356987ba4fdf85845c2cb689f0fce8119622
Score10/10-
Makes use of the framework's Accessibility service.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Reads information about phone network operator.
-