General
-
Target
45f21aefa2ff622d9b48cccf2f1f9d472ad705291efe7424845845196fac7d5b
-
Size
10.3MB
-
Sample
220521-a2rcwaebfl
-
MD5
6b208c9c1b6ad1144ff095eb378bc281
-
SHA1
6d4b5edf0e6c1d497a9dd8e463bac2cfe35323aa
-
SHA256
45f21aefa2ff622d9b48cccf2f1f9d472ad705291efe7424845845196fac7d5b
-
SHA512
0ecb173f6df45d64cd5fe49b70fe98b468739d28f3a72a75c28e610c843423c23ac1e8f994baa1bd3baa7d028401d70479a21b9806e985f427ba67e5cfcdef8d
Static task
static1
Behavioral task
behavioral1
Sample
45f21aefa2ff622d9b48cccf2f1f9d472ad705291efe7424845845196fac7d5b.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
45f21aefa2ff622d9b48cccf2f1f9d472ad705291efe7424845845196fac7d5b
-
Size
10.3MB
-
MD5
6b208c9c1b6ad1144ff095eb378bc281
-
SHA1
6d4b5edf0e6c1d497a9dd8e463bac2cfe35323aa
-
SHA256
45f21aefa2ff622d9b48cccf2f1f9d472ad705291efe7424845845196fac7d5b
-
SHA512
0ecb173f6df45d64cd5fe49b70fe98b468739d28f3a72a75c28e610c843423c23ac1e8f994baa1bd3baa7d028401d70479a21b9806e985f427ba67e5cfcdef8d
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-