General
-
Target
org.ctk.bancamovil.40063.apk
-
Size
74.9MB
-
Sample
220705-r1mfzacbb9
-
MD5
41313191371c9ca9abf46cb0e6aa9e94
-
SHA1
cd6eb8fd904de59e788d2b6cc7e1cb04032135cd
-
SHA256
e329c93776c4875029b4a23d2712104da146b14d531f5ebec2dffc5784d7a1af
-
SHA512
1be08b870704894e4d001413e61edb72d37af1401332efc65e70b2cf04d20aab31b5da79f9dad10c428c5b1265bbe6a2de48a9e6be3d3d56aeb6782b87274333
Static task
static1
Behavioral task
behavioral1
Sample
org.ctk.bancamovil.40063.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
org.ctk.bancamovil.40063.apk
Resource
android-x64-20220621-en
Malware Config
Targets
-
-
Target
org.ctk.bancamovil.40063.apk
-
Size
74.9MB
-
MD5
41313191371c9ca9abf46cb0e6aa9e94
-
SHA1
cd6eb8fd904de59e788d2b6cc7e1cb04032135cd
-
SHA256
e329c93776c4875029b4a23d2712104da146b14d531f5ebec2dffc5784d7a1af
-
SHA512
1be08b870704894e4d001413e61edb72d37af1401332efc65e70b2cf04d20aab31b5da79f9dad10c428c5b1265bbe6a2de48a9e6be3d3d56aeb6782b87274333
Score5/10-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-