Analysis
-
max time kernel
3814736s -
max time network
156s -
platform
android_x64 -
resource
android-x64-arm64-20220310-en -
submitted
20-05-2022 21:29
Static task
static1
Behavioral task
behavioral1
Sample
c3598121525cd431ffbfe26e27d6fb28aaf86dc9174c79794377623d1492c336.apk
Resource
android-x86-arm-20220310-en
android_x86
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c3598121525cd431ffbfe26e27d6fb28aaf86dc9174c79794377623d1492c336.apk
Resource
android-x64-arm64-20220310-en
android_x64
0 signatures
0 seconds
General
-
Target
c3598121525cd431ffbfe26e27d6fb28aaf86dc9174c79794377623d1492c336.apk
-
Size
3.3MB
-
MD5
6dc266b9e83e0dec69b261ab3279329c
-
SHA1
8321717e221283cb94b38d2296e55d3184555ebc
-
SHA256
c3598121525cd431ffbfe26e27d6fb28aaf86dc9174c79794377623d1492c336
-
SHA512
c4dd9005ed470d9df4cecb9c7b2d440216ef2a2654ea2856d7cd959ec71aea583bfb81a709c5a3d55ae9ff0d2a2200aa8f82a7393b6dc8bf7d10028480f1254d
Score
5/10
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.baidusc.xiaoyindescription ioc process Framework API call javax.crypto.Cipher.doFinal com.baidusc.xiaoyin