General
-
Target
560b605b345be8c3a418e15e023c16febfb6d49d1dcb1dbf0f91f430a703e07a
-
Size
6.7MB
-
Sample
220717-s7peksdeb6
-
MD5
0c94aa60d99e49ef68071f81d5eb9ea3
-
SHA1
a8779c9c6d460169f644a090230b693ad207710b
-
SHA256
560b605b345be8c3a418e15e023c16febfb6d49d1dcb1dbf0f91f430a703e07a
-
SHA512
5bb01e822d1dda3bab8a2cabc1a56779630191374406fe9fc31359db58276d62ef027bee5eefe11ac4d7e2c34fa17b110d5343aecee864dca52c1097527f7472
Static task
static1
Behavioral task
behavioral1
Sample
560b605b345be8c3a418e15e023c16febfb6d49d1dcb1dbf0f91f430a703e07a.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/ROMs/MAME4all/feng_salamand/gamelist.txt
ryuk
Targets
-
-
Target
560b605b345be8c3a418e15e023c16febfb6d49d1dcb1dbf0f91f430a703e07a
-
Size
6.7MB
-
MD5
0c94aa60d99e49ef68071f81d5eb9ea3
-
SHA1
a8779c9c6d460169f644a090230b693ad207710b
-
SHA256
560b605b345be8c3a418e15e023c16febfb6d49d1dcb1dbf0f91f430a703e07a
-
SHA512
5bb01e822d1dda3bab8a2cabc1a56779630191374406fe9fc31359db58276d62ef027bee5eefe11ac4d7e2c34fa17b110d5343aecee864dca52c1097527f7472
Score10/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-