General
-
Target
d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575
-
Size
4.7MB
-
Sample
220521-ealerscbbq
-
MD5
f9d9d95aa4ae4236243997f00a013440
-
SHA1
ab2cbbba5d20980717ccd0e30568084d8eff641c
-
SHA256
d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575
-
SHA512
3b890f1262f9b97683af995f0a5635c404c33e8134a3b4f292b646ffd99b8de1f3c3e48efdb2e47de1c88d1c7a0a6d5ad949c139eb6954413852236e593fbe77
Static task
static1
Behavioral task
behavioral1
Sample
d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575
-
Size
4.7MB
-
MD5
f9d9d95aa4ae4236243997f00a013440
-
SHA1
ab2cbbba5d20980717ccd0e30568084d8eff641c
-
SHA256
d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575
-
SHA512
3b890f1262f9b97683af995f0a5635c404c33e8134a3b4f292b646ffd99b8de1f3c3e48efdb2e47de1c88d1c7a0a6d5ad949c139eb6954413852236e593fbe77
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-