General
-
Target
796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe
-
Size
5.6MB
-
Sample
220520-1alw7aghal
-
MD5
f56c840d86aca1c68408584582fe6663
-
SHA1
2a2b4c60c779bd330b29627c4ecbf98f53cc79e7
-
SHA256
796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe
-
SHA512
216f6368e37788f68ead2c8ef8868e6738b9693ceb8d820b16053fe519a43388d3da98f02c1eea40c4427df6e23b7cc96067d935970296b1fc9386aac62b77d2
Static task
static1
Behavioral task
behavioral1
Sample
796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe
-
Size
5.6MB
-
MD5
f56c840d86aca1c68408584582fe6663
-
SHA1
2a2b4c60c779bd330b29627c4ecbf98f53cc79e7
-
SHA256
796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe
-
SHA512
216f6368e37788f68ead2c8ef8868e6738b9693ceb8d820b16053fe519a43388d3da98f02c1eea40c4427df6e23b7cc96067d935970296b1fc9386aac62b77d2
Score7/10-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests cell location
Uses Android APIs to to get current cell information.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-