General
-
Target
Custom Picture Caller Show.apk
-
Size
15.2MB
-
Sample
220704-j548kshfg9
-
MD5
e0697e62838a5f058a8378b0d71f1fff
-
SHA1
af5d359e2c8472bc897a188ede227ab144a8ec17
-
SHA256
7c63db260e82f1849d1bdc9501cc03d13e622707b1f55c63920cacb8a188cce0
-
SHA512
8f7d0a4999865644d06789084b805b3c1b9a794aeb21c8581ca698bedf97a7f86958ac986aa6be68d6ee657e236e539ed2604c466532611adacbd1a32ff2ba5c
Static task
static1
Behavioral task
behavioral1
Sample
Custom Picture Caller Show.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
Custom Picture Caller Show.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
Custom Picture Caller Show.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Targets
-
-
Target
Custom Picture Caller Show.apk
-
Size
15.2MB
-
MD5
e0697e62838a5f058a8378b0d71f1fff
-
SHA1
af5d359e2c8472bc897a188ede227ab144a8ec17
-
SHA256
7c63db260e82f1849d1bdc9501cc03d13e622707b1f55c63920cacb8a188cce0
-
SHA512
8f7d0a4999865644d06789084b805b3c1b9a794aeb21c8581ca698bedf97a7f86958ac986aa6be68d6ee657e236e539ed2604c466532611adacbd1a32ff2ba5c
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-