General
-
Target
f05e9868d0e0da036f24a3d9b6e4eac9c676319fa4d2726a6921654efb6852df
-
Size
5.1MB
-
Sample
220520-128j9shgbk
-
MD5
dfc129f096e0c4059b3a96189684fa44
-
SHA1
113a7df10fb87a6e2b2155e5efb66f90cf382ffb
-
SHA256
f05e9868d0e0da036f24a3d9b6e4eac9c676319fa4d2726a6921654efb6852df
-
SHA512
45695a4d61e253e12990c0e4b91651b033c46f51877791927f7bf703f55788173cd576c8dcd74150c56405997ce255f186aaa993ac05e86f64f112c84db82377
Static task
static1
Behavioral task
behavioral1
Sample
f05e9868d0e0da036f24a3d9b6e4eac9c676319fa4d2726a6921654efb6852df.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
f05e9868d0e0da036f24a3d9b6e4eac9c676319fa4d2726a6921654efb6852df
-
Size
5.1MB
-
MD5
dfc129f096e0c4059b3a96189684fa44
-
SHA1
113a7df10fb87a6e2b2155e5efb66f90cf382ffb
-
SHA256
f05e9868d0e0da036f24a3d9b6e4eac9c676319fa4d2726a6921654efb6852df
-
SHA512
45695a4d61e253e12990c0e4b91651b033c46f51877791927f7bf703f55788173cd576c8dcd74150c56405997ce255f186aaa993ac05e86f64f112c84db82377
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-