General
-
Target
462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e
-
Size
5.3MB
-
Sample
220521-pn37vaahdp
-
MD5
9d0757f629579ab19fdf75b1404d6a67
-
SHA1
531b894b619557ec891a8d41d2e6cabb59f055d6
-
SHA256
462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e
-
SHA512
dd738196aae7dc021b7ec3f64b8d1c6d533d58187865053ae0fb006f3a851303a2ba6594a719e558303c0d62264d192a8f2e8e446de5370ddd67edfa18f813df
Static task
static1
Behavioral task
behavioral1
Sample
462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e
-
Size
5.3MB
-
MD5
9d0757f629579ab19fdf75b1404d6a67
-
SHA1
531b894b619557ec891a8d41d2e6cabb59f055d6
-
SHA256
462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e
-
SHA512
dd738196aae7dc021b7ec3f64b8d1c6d533d58187865053ae0fb006f3a851303a2ba6594a719e558303c0d62264d192a8f2e8e446de5370ddd67edfa18f813df
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-