General
-
Target
d34c5e8e5cf4500e90f6fbcd3f7ed79a289defe767558cbc034a9cd9747b98bc
-
Size
16.7MB
-
Sample
220718-tqcj5aafep
-
MD5
fb2ec546aca162a8fd16e8f21b374d27
-
SHA1
ebeda0bf39630442bba27e4df261aa488a5fdadf
-
SHA256
d34c5e8e5cf4500e90f6fbcd3f7ed79a289defe767558cbc034a9cd9747b98bc
-
SHA512
675230150fccc36b9df97e9158781a735ed9f4fd77a1ca6989b0485e6221ea145b5a592655b495f140d6d801d4e775934736014a6a2b6135ffeb69c70e9d37a5
Static task
static1
Behavioral task
behavioral1
Sample
d34c5e8e5cf4500e90f6fbcd3f7ed79a289defe767558cbc034a9cd9747b98bc.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/zymame/gamelist.txt
ryuk
Targets
-
-
Target
d34c5e8e5cf4500e90f6fbcd3f7ed79a289defe767558cbc034a9cd9747b98bc
-
Size
16.7MB
-
MD5
fb2ec546aca162a8fd16e8f21b374d27
-
SHA1
ebeda0bf39630442bba27e4df261aa488a5fdadf
-
SHA256
d34c5e8e5cf4500e90f6fbcd3f7ed79a289defe767558cbc034a9cd9747b98bc
-
SHA512
675230150fccc36b9df97e9158781a735ed9f4fd77a1ca6989b0485e6221ea145b5a592655b495f140d6d801d4e775934736014a6a2b6135ffeb69c70e9d37a5
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-