General
-
Target
22816a3acaddd9080e51aeb36cb9211495762af7243dc33a0e14d17eda8b91c7
-
Size
9.9MB
-
Sample
220520-3nc8bacbbk
-
MD5
5dd0606c2681af9254a82df9d8438f06
-
SHA1
bc983ed6e076e161aa7aebfede521f05d0ec93c1
-
SHA256
22816a3acaddd9080e51aeb36cb9211495762af7243dc33a0e14d17eda8b91c7
-
SHA512
feffcf68596d7c9207df596610002f640ee56b837c825ee8c87ef86a0967eb02a42a95ec3e4f39deb93037fb8227283e832ced60602bd5ae48f831b07502f976
Static task
static1
Behavioral task
behavioral1
Sample
22816a3acaddd9080e51aeb36cb9211495762af7243dc33a0e14d17eda8b91c7.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
22816a3acaddd9080e51aeb36cb9211495762af7243dc33a0e14d17eda8b91c7
-
Size
9.9MB
-
MD5
5dd0606c2681af9254a82df9d8438f06
-
SHA1
bc983ed6e076e161aa7aebfede521f05d0ec93c1
-
SHA256
22816a3acaddd9080e51aeb36cb9211495762af7243dc33a0e14d17eda8b91c7
-
SHA512
feffcf68596d7c9207df596610002f640ee56b837c825ee8c87ef86a0967eb02a42a95ec3e4f39deb93037fb8227283e832ced60602bd5ae48f831b07502f976
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-