General
-
Target
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9
-
Size
206KB
-
Sample
220520-3nw1eshcb3
-
MD5
34964abf4a2e77a77f65ea8ffb07527e
-
SHA1
d5fe6bc6466145647e4e2ea825b2de8478be0f9a
-
SHA256
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9
-
SHA512
58095d78f2a9fb27e6611b2236e6120cbec93b277bd1be605d6b1d1a425ec3ea3cafa8f32d3d2c6bbc791a44cc5e220efa3046f00835cc116674897413179693
Static task
static1
Behavioral task
behavioral1
Sample
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9
-
Size
206KB
-
MD5
34964abf4a2e77a77f65ea8ffb07527e
-
SHA1
d5fe6bc6466145647e4e2ea825b2de8478be0f9a
-
SHA256
2d96a7112da0417089ee4b0fea7a0b68661c699a06527dc70b7423cab87e58c9
-
SHA512
58095d78f2a9fb27e6611b2236e6120cbec93b277bd1be605d6b1d1a425ec3ea3cafa8f32d3d2c6bbc791a44cc5e220efa3046f00835cc116674897413179693
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-