General
-
Target
547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8
-
Size
5.4MB
-
Sample
220520-2caglsfag4
-
MD5
4d19c031247c652cb6492499c8b62a07
-
SHA1
df96e0ee65372d93a39aec352eeb1a7c63e354fb
-
SHA256
547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8
-
SHA512
e394cfb2bbd0bee851d813cf2f1bb8c714f482d3078dd2bcbf8f18ef078927d4121d0f1050d8935d8672d82f98ea3912eb3f64f1f1b29d9a51ba04fb3a14cd52
Static task
static1
Behavioral task
behavioral1
Sample
547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8
-
Size
5.4MB
-
MD5
4d19c031247c652cb6492499c8b62a07
-
SHA1
df96e0ee65372d93a39aec352eeb1a7c63e354fb
-
SHA256
547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8
-
SHA512
e394cfb2bbd0bee851d813cf2f1bb8c714f482d3078dd2bcbf8f18ef078927d4121d0f1050d8935d8672d82f98ea3912eb3f64f1f1b29d9a51ba04fb3a14cd52
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-