General
-
Target
6b21e15d334c24b9c0f32344f75af2d3436d0091d8bf8b054bde16910777a324
-
Size
4.4MB
-
Sample
220521-pnx1tsffh2
-
MD5
7bff39bc604ea8e71302812f92dbdb3b
-
SHA1
c35e8f737ebe4e600f0642d3206c772511a04933
-
SHA256
6b21e15d334c24b9c0f32344f75af2d3436d0091d8bf8b054bde16910777a324
-
SHA512
6757d8c530dc967dcb467b87c745e82b24c20a9bddd5c5be6b1421406865f97c10acd1bf8e880b9e4309970153a9aa297e2ae92ddd40d92ab823addd9615e95b
Static task
static1
Behavioral task
behavioral1
Sample
6b21e15d334c24b9c0f32344f75af2d3436d0091d8bf8b054bde16910777a324.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
6b21e15d334c24b9c0f32344f75af2d3436d0091d8bf8b054bde16910777a324
-
Size
4.4MB
-
MD5
7bff39bc604ea8e71302812f92dbdb3b
-
SHA1
c35e8f737ebe4e600f0642d3206c772511a04933
-
SHA256
6b21e15d334c24b9c0f32344f75af2d3436d0091d8bf8b054bde16910777a324
-
SHA512
6757d8c530dc967dcb467b87c745e82b24c20a9bddd5c5be6b1421406865f97c10acd1bf8e880b9e4309970153a9aa297e2ae92ddd40d92ab823addd9615e95b
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-