General
-
Target
a14c3b50628d3228124bb0f7f4f0307f1f4a991e6205b5ec8851fdc5e1d505c6
-
Size
3.9MB
-
Sample
220521-a1vznsbbb6
-
MD5
88de4f4a115c61938878849afb8308a9
-
SHA1
9315375f2a31bc938f7d90762754a2eae41f075c
-
SHA256
a14c3b50628d3228124bb0f7f4f0307f1f4a991e6205b5ec8851fdc5e1d505c6
-
SHA512
81faa9d6e41fa91cb54df79ff2cf53b2f0226b0094a2391445617a9e410f727558b75b59509b89ef70813d95f68c0924944b1bee2cef9a2e208db7b467a7b64e
Static task
static1
Behavioral task
behavioral1
Sample
a14c3b50628d3228124bb0f7f4f0307f1f4a991e6205b5ec8851fdc5e1d505c6.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
a14c3b50628d3228124bb0f7f4f0307f1f4a991e6205b5ec8851fdc5e1d505c6
-
Size
3.9MB
-
MD5
88de4f4a115c61938878849afb8308a9
-
SHA1
9315375f2a31bc938f7d90762754a2eae41f075c
-
SHA256
a14c3b50628d3228124bb0f7f4f0307f1f4a991e6205b5ec8851fdc5e1d505c6
-
SHA512
81faa9d6e41fa91cb54df79ff2cf53b2f0226b0094a2391445617a9e410f727558b75b59509b89ef70813d95f68c0924944b1bee2cef9a2e208db7b467a7b64e
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-