General
-
Target
0d45fca53ea016e442dc78eae633ea8c8375bb76a5b0aa8030b2b64957183a32
-
Size
533KB
-
Sample
220521-xvnpqsfhbq
-
MD5
05e2440fad6370aecd2ad0f8529ae3bd
-
SHA1
6e13529e8c5aec5e7ebccd2e14f384a55104d038
-
SHA256
0d45fca53ea016e442dc78eae633ea8c8375bb76a5b0aa8030b2b64957183a32
-
SHA512
e4fb43f88f32e48f3fc57faee4ec7e147d2ebe6ac2176805b64c3537fbb595fdfc43fffa6cd5ee596b970a4ebd1388dcd814ae18c31f99e993534749eb31c4f6
Static task
static1
Behavioral task
behavioral1
Sample
0d45fca53ea016e442dc78eae633ea8c8375bb76a5b0aa8030b2b64957183a32.apk
Resource
android-x86-arm-20220310-en
Malware Config
Targets
-
-
Target
0d45fca53ea016e442dc78eae633ea8c8375bb76a5b0aa8030b2b64957183a32
-
Size
533KB
-
MD5
05e2440fad6370aecd2ad0f8529ae3bd
-
SHA1
6e13529e8c5aec5e7ebccd2e14f384a55104d038
-
SHA256
0d45fca53ea016e442dc78eae633ea8c8375bb76a5b0aa8030b2b64957183a32
-
SHA512
e4fb43f88f32e48f3fc57faee4ec7e147d2ebe6ac2176805b64c3537fbb595fdfc43fffa6cd5ee596b970a4ebd1388dcd814ae18c31f99e993534749eb31c4f6
Score7/10-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-