General
-
Target
b6c742cca4eb1cbd1f47dd4b224e9b0df32e1e82ee10b8dd72fb456636756d34
-
Size
1.1MB
-
Sample
220521-wyz2hadhbp
-
MD5
f5260db36f0ce5521d65dd0b3815f10b
-
SHA1
cd79fa1c46c3b26c302896336e8d01132d22890d
-
SHA256
b6c742cca4eb1cbd1f47dd4b224e9b0df32e1e82ee10b8dd72fb456636756d34
-
SHA512
fc673a7ede0d888045a41a1ae63d953bc172c65f6d78bc673e0cde7a89a4b788dfc015f93c705c5cd966cdf67c64c6c7173cdac418f701e5dac2903b535626a5
Static task
static1
Behavioral task
behavioral1
Sample
b6c742cca4eb1cbd1f47dd4b224e9b0df32e1e82ee10b8dd72fb456636756d34.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
b6c742cca4eb1cbd1f47dd4b224e9b0df32e1e82ee10b8dd72fb456636756d34
-
Size
1.1MB
-
MD5
f5260db36f0ce5521d65dd0b3815f10b
-
SHA1
cd79fa1c46c3b26c302896336e8d01132d22890d
-
SHA256
b6c742cca4eb1cbd1f47dd4b224e9b0df32e1e82ee10b8dd72fb456636756d34
-
SHA512
fc673a7ede0d888045a41a1ae63d953bc172c65f6d78bc673e0cde7a89a4b788dfc015f93c705c5cd966cdf67c64c6c7173cdac418f701e5dac2903b535626a5
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI).
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-