General
-
Target
1885f8dffb3f58f51877df2f1c209c5fff2c666cad906f07b4ce37307f10e9ca
-
Size
5.6MB
-
Sample
220520-1lxstseae9
-
MD5
5255ae983099e2a80b3771bee7204ff6
-
SHA1
963b532372ad0bc8d1e2bc97395195014160270f
-
SHA256
1885f8dffb3f58f51877df2f1c209c5fff2c666cad906f07b4ce37307f10e9ca
-
SHA512
cb2114b7d30b92a2facf0bb2d8a089ab41b31843dd6f6a8c28ca87a8e966b36aca2b1209a7c65580a85c7f2c3372ee77ed4653ed8f854127e62c806ef6bd1985
Static task
static1
Behavioral task
behavioral1
Sample
1885f8dffb3f58f51877df2f1c209c5fff2c666cad906f07b4ce37307f10e9ca.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
1885f8dffb3f58f51877df2f1c209c5fff2c666cad906f07b4ce37307f10e9ca
-
Size
5.6MB
-
MD5
5255ae983099e2a80b3771bee7204ff6
-
SHA1
963b532372ad0bc8d1e2bc97395195014160270f
-
SHA256
1885f8dffb3f58f51877df2f1c209c5fff2c666cad906f07b4ce37307f10e9ca
-
SHA512
cb2114b7d30b92a2facf0bb2d8a089ab41b31843dd6f6a8c28ca87a8e966b36aca2b1209a7c65580a85c7f2c3372ee77ed4653ed8f854127e62c806ef6bd1985
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-