General
-
Target
03aa54590d44048e4cfcf0c1477255133013ee122aa02e263d402dfe582f1aaa
-
Size
6.5MB
-
Sample
220718-t7eqtabchl
-
MD5
e8295fe11c3789fc22d42a38cb92f7e1
-
SHA1
513de1e21b7460fb8e51673759012d59a38cd696
-
SHA256
03aa54590d44048e4cfcf0c1477255133013ee122aa02e263d402dfe582f1aaa
-
SHA512
bb47afd97c9342a961ec26e53fe0ab3278bb29eb35bbae69bea0a472d7884836501f113d1e4e3c5087214368842e1405bd534eed27d9fa96e08ee5d4fb2c2b44
Static task
static1
Behavioral task
behavioral1
Sample
03aa54590d44048e4cfcf0c1477255133013ee122aa02e263d402dfe582f1aaa.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/ROMs/MAME4all/gberetb/gamelist.txt
ryuk
Targets
-
-
Target
03aa54590d44048e4cfcf0c1477255133013ee122aa02e263d402dfe582f1aaa
-
Size
6.5MB
-
MD5
e8295fe11c3789fc22d42a38cb92f7e1
-
SHA1
513de1e21b7460fb8e51673759012d59a38cd696
-
SHA256
03aa54590d44048e4cfcf0c1477255133013ee122aa02e263d402dfe582f1aaa
-
SHA512
bb47afd97c9342a961ec26e53fe0ab3278bb29eb35bbae69bea0a472d7884836501f113d1e4e3c5087214368842e1405bd534eed27d9fa96e08ee5d4fb2c2b44
Score10/10-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-