General
-
Target
com.ctgsms.mesglass.apk
-
Size
6.2MB
-
Sample
220320-h13zaaaec6
-
MD5
34c24c0cf73289b1d5298960e1d75501
-
SHA1
6bdcd892e4c8080cbb02beb7ab3dd927cf84f4a4
-
SHA256
b3d4bbba8aa5451f23f636367db4d16e00c5cc5416770fd5bde80a7fc61fe96e
-
SHA512
44a5c9bf3dd7e5bc79676ed7291c76fa196296e2b1f880150495bd0289abff75b2c9953975a3b431e34a67c849c63890188b2d3e1a88331902c88890e62d1de3
Static task
static1
Behavioral task
behavioral1
Sample
com.ctgsms.mesglass.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
com.ctgsms.mesglass.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
com.ctgsms.mesglass.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
com.ctgsms.mesglass.apk
-
Size
6.2MB
-
MD5
34c24c0cf73289b1d5298960e1d75501
-
SHA1
6bdcd892e4c8080cbb02beb7ab3dd927cf84f4a4
-
SHA256
b3d4bbba8aa5451f23f636367db4d16e00c5cc5416770fd5bde80a7fc61fe96e
-
SHA512
44a5c9bf3dd7e5bc79676ed7291c76fa196296e2b1f880150495bd0289abff75b2c9953975a3b431e34a67c849c63890188b2d3e1a88331902c88890e62d1de3
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-