General
-
Target
c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187
-
Size
1.5MB
-
Sample
220701-gwyy4afcbk
-
MD5
24e50862d94f40c163de0cff6043096b
-
SHA1
caa7a20919259762c07c42016e177897cb2b8296
-
SHA256
c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187
-
SHA512
f8048af12b41b7fb130df18b48c6fc2c014193dbf39715818f027506ce5455745663626010f281bbbadb6b6fc5b7ccbefdb0226c363de6767b2670c87013027a
Static task
static1
Behavioral task
behavioral1
Sample
c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187
-
Size
1.5MB
-
MD5
24e50862d94f40c163de0cff6043096b
-
SHA1
caa7a20919259762c07c42016e177897cb2b8296
-
SHA256
c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187
-
SHA512
f8048af12b41b7fb130df18b48c6fc2c014193dbf39715818f027506ce5455745663626010f281bbbadb6b6fc5b7ccbefdb0226c363de6767b2670c87013027a
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-