General
-
Target
79db121406f2d81a59384ed8fa205fca9ed825984de2de02b65f63a53829010b
-
Size
8.5MB
-
Sample
220524-s8jkqacbdk
-
MD5
be03543b2c4d87948131b13ff0c85d96
-
SHA1
95d0ec4b22e5414795f0fb4ab833975932a98129
-
SHA256
79db121406f2d81a59384ed8fa205fca9ed825984de2de02b65f63a53829010b
-
SHA512
871a5f10bd7476186ceaea73a5ed61dff8ae855464a537d28f9ba9642181c2f7b18e8064d78827ec080486cb269bf7d06df712d7d3f0bd72bbd17ce07b0a0cfa
Static task
static1
Behavioral task
behavioral1
Sample
79db121406f2d81a59384ed8fa205fca9ed825984de2de02b65f63a53829010b.apk
Resource
android-x86-arm-20220310-en
Malware Config
Extracted
/storage/emulated/0/zymame/gamelist.txt
ryuk
Targets
-
-
Target
79db121406f2d81a59384ed8fa205fca9ed825984de2de02b65f63a53829010b
-
Size
8.5MB
-
MD5
be03543b2c4d87948131b13ff0c85d96
-
SHA1
95d0ec4b22e5414795f0fb4ab833975932a98129
-
SHA256
79db121406f2d81a59384ed8fa205fca9ed825984de2de02b65f63a53829010b
-
SHA512
871a5f10bd7476186ceaea73a5ed61dff8ae855464a537d28f9ba9642181c2f7b18e8064d78827ec080486cb269bf7d06df712d7d3f0bd72bbd17ce07b0a0cfa
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-