General
-
Target
b66e48212fc1b3acf941e1e43f9436a47d230ea237bf6515ae1f3e25e3cc49bf
-
Size
7.3MB
-
Sample
220718-t33xvahhb9
-
MD5
ec4ea87802fdf1f9ce7b7f582adf971d
-
SHA1
58612c3db1ba0a81ed437642adb914a87c6806a0
-
SHA256
b66e48212fc1b3acf941e1e43f9436a47d230ea237bf6515ae1f3e25e3cc49bf
-
SHA512
88375cc01bc9c2c68331e04311f0f8a593e31438d6ee93571aa4518fb553138314dc7a04a3823eea47aac7f989190e275c06fc7ecce71f39311513b0f169ff15
Static task
static1
Behavioral task
behavioral1
Sample
b66e48212fc1b3acf941e1e43f9436a47d230ea237bf6515ae1f3e25e3cc49bf.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/zymame/gamelist.txt
ryuk
Targets
-
-
Target
b66e48212fc1b3acf941e1e43f9436a47d230ea237bf6515ae1f3e25e3cc49bf
-
Size
7.3MB
-
MD5
ec4ea87802fdf1f9ce7b7f582adf971d
-
SHA1
58612c3db1ba0a81ed437642adb914a87c6806a0
-
SHA256
b66e48212fc1b3acf941e1e43f9436a47d230ea237bf6515ae1f3e25e3cc49bf
-
SHA512
88375cc01bc9c2c68331e04311f0f8a593e31438d6ee93571aa4518fb553138314dc7a04a3823eea47aac7f989190e275c06fc7ecce71f39311513b0f169ff15
Score10/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-