General
-
Target
3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2
-
Size
6.0MB
-
Sample
220520-2t9b9sbadl
-
MD5
9d7612e9082ec805fd0ee7752076ac25
-
SHA1
e96dff37974da7e594336819f577cefeaa38aeae
-
SHA256
3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2
-
SHA512
bac2ad351c1fa586f6045020f47a5cba640f723b9b22009c1f4b6ab900984e710ab015fcbb31c3040e5ef95f1e9d7c87da87913744662ecdfece52fb63cc43cd
Static task
static1
Behavioral task
behavioral1
Sample
3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2
-
Size
6.0MB
-
MD5
9d7612e9082ec805fd0ee7752076ac25
-
SHA1
e96dff37974da7e594336819f577cefeaa38aeae
-
SHA256
3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2
-
SHA512
bac2ad351c1fa586f6045020f47a5cba640f723b9b22009c1f4b6ab900984e710ab015fcbb31c3040e5ef95f1e9d7c87da87913744662ecdfece52fb63cc43cd
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-