General
-
Target
4d5f8d6a3f9c2380b00a22a9e64c16158a6662d2eeb81df4b4410268f66d2177
-
Size
18.1MB
-
Sample
220521-pg9faaaeek
-
MD5
880a35e535add9f84210181249b66720
-
SHA1
3ef2d1153ae484eaf1a2cfe5e0d7f0b1672cc321
-
SHA256
4d5f8d6a3f9c2380b00a22a9e64c16158a6662d2eeb81df4b4410268f66d2177
-
SHA512
d5bf5ef705f1385df44b67f4427619174edc56c3f8ec3153a18cc9482c16437fe89999dd50f496f30804c07b000df47ec3c3e9a2d10b2e132b5930b55367201b
Static task
static1
Behavioral task
behavioral1
Sample
4d5f8d6a3f9c2380b00a22a9e64c16158a6662d2eeb81df4b4410268f66d2177.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
4d5f8d6a3f9c2380b00a22a9e64c16158a6662d2eeb81df4b4410268f66d2177
-
Size
18.1MB
-
MD5
880a35e535add9f84210181249b66720
-
SHA1
3ef2d1153ae484eaf1a2cfe5e0d7f0b1672cc321
-
SHA256
4d5f8d6a3f9c2380b00a22a9e64c16158a6662d2eeb81df4b4410268f66d2177
-
SHA512
d5bf5ef705f1385df44b67f4427619174edc56c3f8ec3153a18cc9482c16437fe89999dd50f496f30804c07b000df47ec3c3e9a2d10b2e132b5930b55367201b
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-