General
-
Target
51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17
-
Size
3.1MB
-
Sample
220521-wy4ppaaeg8
-
MD5
a666bb01fdae5a339c6ac7037b739727
-
SHA1
313711a4d5c5271cd28f41ad83d8db3b19016d06
-
SHA256
51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17
-
SHA512
85ea213c9414d781f821db10e0736ed302497d258b5bab631d902f04373f3e7d12e9b56344efc743c153b4a603311b6ae00605ca322e1f5aab5810b21f306ff6
Static task
static1
Behavioral task
behavioral1
Sample
51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17
-
Size
3.1MB
-
MD5
a666bb01fdae5a339c6ac7037b739727
-
SHA1
313711a4d5c5271cd28f41ad83d8db3b19016d06
-
SHA256
51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17
-
SHA512
85ea213c9414d781f821db10e0736ed302497d258b5bab631d902f04373f3e7d12e9b56344efc743c153b4a603311b6ae00605ca322e1f5aab5810b21f306ff6
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-