General
-
Target
68a0901ff88a355e39e50be31f81e407e7ccc8686bb75f103e49ac7a2364b220
-
Size
5.1MB
-
Sample
220521-bh4drsbhd6
-
MD5
36d8db3c82f7c86bfac3b9544d895e75
-
SHA1
81da9cc6c445ec03f2ae5f465267bd9943459e2a
-
SHA256
68a0901ff88a355e39e50be31f81e407e7ccc8686bb75f103e49ac7a2364b220
-
SHA512
abef227d6d1700270848798c90495d9fba2fa8e99f78cedf57346d6df821b16e055211dc79c256e8d8ff29276edd717b0ae8212a6cff5898459abd8c22a84fd3
Static task
static1
Behavioral task
behavioral1
Sample
68a0901ff88a355e39e50be31f81e407e7ccc8686bb75f103e49ac7a2364b220.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
68a0901ff88a355e39e50be31f81e407e7ccc8686bb75f103e49ac7a2364b220
-
Size
5.1MB
-
MD5
36d8db3c82f7c86bfac3b9544d895e75
-
SHA1
81da9cc6c445ec03f2ae5f465267bd9943459e2a
-
SHA256
68a0901ff88a355e39e50be31f81e407e7ccc8686bb75f103e49ac7a2364b220
-
SHA512
abef227d6d1700270848798c90495d9fba2fa8e99f78cedf57346d6df821b16e055211dc79c256e8d8ff29276edd717b0ae8212a6cff5898459abd8c22a84fd3
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-