General
-
Target
10bf0bd6135318dfb0e88f9c21b7fa8d5f282617be9892691f4a4965a761083b
-
Size
6.3MB
-
Sample
220701-hv1a7shafm
-
MD5
8f363c197351cdd4b0a5e7eb21d71de6
-
SHA1
c00500292e17676e80eaefbae39097a129a2ffa3
-
SHA256
10bf0bd6135318dfb0e88f9c21b7fa8d5f282617be9892691f4a4965a761083b
-
SHA512
7561aa8046b7a98b1f645c1dcc3234d5cc283166b4c29f18b86c0d4c4f4b008f494c04677107835a79dfbd283b14e528200f122abdf978f9d4c85cfd9685904b
Static task
static1
Behavioral task
behavioral1
Sample
10bf0bd6135318dfb0e88f9c21b7fa8d5f282617be9892691f4a4965a761083b.apk
Resource
android-x86-arm-20220621-en
Malware Config
Targets
-
-
Target
10bf0bd6135318dfb0e88f9c21b7fa8d5f282617be9892691f4a4965a761083b
-
Size
6.3MB
-
MD5
8f363c197351cdd4b0a5e7eb21d71de6
-
SHA1
c00500292e17676e80eaefbae39097a129a2ffa3
-
SHA256
10bf0bd6135318dfb0e88f9c21b7fa8d5f282617be9892691f4a4965a761083b
-
SHA512
7561aa8046b7a98b1f645c1dcc3234d5cc283166b4c29f18b86c0d4c4f4b008f494c04677107835a79dfbd283b14e528200f122abdf978f9d4c85cfd9685904b
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests dangerous framework permissions
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-