General
-
Target
a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060
-
Size
4.0MB
-
Sample
220520-3td2sscdck
-
MD5
dcbe8909eb8a93aa58c61f895e90231b
-
SHA1
440d12b7c9b17561341edf632946265f56614c0b
-
SHA256
a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060
-
SHA512
7c033b105290cfc0d9dea966749ed7c715c12e9d516deb0f146bbae88142976123a4c2a889dd45d66e89a231a31456be9b7c6afd6642a6554a9da7f1333fc330
Static task
static1
Behavioral task
behavioral1
Sample
a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060
-
Size
4.0MB
-
MD5
dcbe8909eb8a93aa58c61f895e90231b
-
SHA1
440d12b7c9b17561341edf632946265f56614c0b
-
SHA256
a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060
-
SHA512
7c033b105290cfc0d9dea966749ed7c715c12e9d516deb0f146bbae88142976123a4c2a889dd45d66e89a231a31456be9b7c6afd6642a6554a9da7f1333fc330
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-