General
-
Target
955449d56a072cbdb39ed34a43fda7bb761be9219a4bc8dae807644388646e88
-
Size
18.3MB
-
Sample
220701-hwf9qahahn
-
MD5
74211f570aac71d2b3a47f3d5c97517c
-
SHA1
835679abc30245a98c763163b51cb85ec0eba10e
-
SHA256
955449d56a072cbdb39ed34a43fda7bb761be9219a4bc8dae807644388646e88
-
SHA512
8001995f1906e7a775fc5d78dc59cf64a24653d7567275ba651b5758bf07d88e117741c7c7df3284f5374b14a2065e1fc5813652438497726ec9a94934111c1b
Static task
static1
Behavioral task
behavioral1
Sample
955449d56a072cbdb39ed34a43fda7bb761be9219a4bc8dae807644388646e88.apk
Resource
android-x86-arm-20220621-en
Malware Config
Targets
-
-
Target
955449d56a072cbdb39ed34a43fda7bb761be9219a4bc8dae807644388646e88
-
Size
18.3MB
-
MD5
74211f570aac71d2b3a47f3d5c97517c
-
SHA1
835679abc30245a98c763163b51cb85ec0eba10e
-
SHA256
955449d56a072cbdb39ed34a43fda7bb761be9219a4bc8dae807644388646e88
-
SHA512
8001995f1906e7a775fc5d78dc59cf64a24653d7567275ba651b5758bf07d88e117741c7c7df3284f5374b14a2065e1fc5813652438497726ec9a94934111c1b
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-