General
-
Target
d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde
-
Size
263KB
-
Sample
220521-bhxk8aehen
-
MD5
b0045215045d3c6c88022336eed83a41
-
SHA1
ecf1c58d4e8dd900464e2c50fa97347a7a0a5192
-
SHA256
d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde
-
SHA512
dd82d2cffa191e01822d168610c317687d69f702a3add03d296b8d90dfbe2d347407ca28183cdd1b0a42c8ea1d21397d351da451a8b4169a4c22a3ba945fadd7
Static task
static1
Behavioral task
behavioral1
Sample
d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde
-
Size
263KB
-
MD5
b0045215045d3c6c88022336eed83a41
-
SHA1
ecf1c58d4e8dd900464e2c50fa97347a7a0a5192
-
SHA256
d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde
-
SHA512
dd82d2cffa191e01822d168610c317687d69f702a3add03d296b8d90dfbe2d347407ca28183cdd1b0a42c8ea1d21397d351da451a8b4169a4c22a3ba945fadd7
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-