General
-
Target
44347b360066b6e052252751198637af9508ff9af3525172d6f2e7ef1f9f3fd9
-
Size
263KB
-
Sample
220520-1b3akadgb5
-
MD5
b967c8b2c544ae657ac9cd5aa6785f31
-
SHA1
39ddca8260e33bb3296821212f2c70d8c4b913c5
-
SHA256
44347b360066b6e052252751198637af9508ff9af3525172d6f2e7ef1f9f3fd9
-
SHA512
8d1eae5a82c0f53dd641c2bcb103a2d3896b5ef5603de3686cc306fa6944b434cb6de13f88913aaae51c32def28bec12867f9afcf316669825b67f6176dbe7eb
Static task
static1
Behavioral task
behavioral1
Sample
44347b360066b6e052252751198637af9508ff9af3525172d6f2e7ef1f9f3fd9.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
44347b360066b6e052252751198637af9508ff9af3525172d6f2e7ef1f9f3fd9.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
44347b360066b6e052252751198637af9508ff9af3525172d6f2e7ef1f9f3fd9.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
44347b360066b6e052252751198637af9508ff9af3525172d6f2e7ef1f9f3fd9
-
Size
263KB
-
MD5
b967c8b2c544ae657ac9cd5aa6785f31
-
SHA1
39ddca8260e33bb3296821212f2c70d8c4b913c5
-
SHA256
44347b360066b6e052252751198637af9508ff9af3525172d6f2e7ef1f9f3fd9
-
SHA512
8d1eae5a82c0f53dd641c2bcb103a2d3896b5ef5603de3686cc306fa6944b434cb6de13f88913aaae51c32def28bec12867f9afcf316669825b67f6176dbe7eb
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-