General
-
Target
0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2
-
Size
263KB
-
Sample
220521-nmx4rshafl
-
MD5
0105c9fc3fca54eff57d0aa586fd7e72
-
SHA1
270d47af315ad248062c91acf05172fbe5d0f223
-
SHA256
0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2
-
SHA512
090b46ffc29b3f49e413e68fa368c680f19cf613b8250dcb52734208081ac9d9381e7f15f808e22e89a4db348bf595d712855674b646b9949a6ba6d19ea31e7c
Static task
static1
Behavioral task
behavioral1
Sample
0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2
-
Size
263KB
-
MD5
0105c9fc3fca54eff57d0aa586fd7e72
-
SHA1
270d47af315ad248062c91acf05172fbe5d0f223
-
SHA256
0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2
-
SHA512
090b46ffc29b3f49e413e68fa368c680f19cf613b8250dcb52734208081ac9d9381e7f15f808e22e89a4db348bf595d712855674b646b9949a6ba6d19ea31e7c
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-