General
-
Target
6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf
-
Size
263KB
-
Sample
220520-1gmr3ahagr
-
MD5
3f40cb131f3e98c7f0f60854738046f9
-
SHA1
f885004d7ecd035f9c35dbd2f0599039f9e34e53
-
SHA256
6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf
-
SHA512
7819ccaca7fe852b5c3116b45b7a76230c561814a8b4270d037285be2fa4ec2e90807415eb4093deda4d826869e5dafe4b73b8266d2554d43432795f0b8ae4ae
Static task
static1
Behavioral task
behavioral1
Sample
6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf
-
Size
263KB
-
MD5
3f40cb131f3e98c7f0f60854738046f9
-
SHA1
f885004d7ecd035f9c35dbd2f0599039f9e34e53
-
SHA256
6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf
-
SHA512
7819ccaca7fe852b5c3116b45b7a76230c561814a8b4270d037285be2fa4ec2e90807415eb4093deda4d826869e5dafe4b73b8266d2554d43432795f0b8ae4ae
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-