General
-
Target
9af5491c3b298ace59bee6ae90030dfff400786d5cac98b9fcc231df71fd0bb1
-
Size
6.9MB
-
Sample
220718-tqyglahdd7
-
MD5
fadbdb7caacb97f37869beeba102bc6d
-
SHA1
884af4719b145c5123355391656d8c3dd23edb5e
-
SHA256
9af5491c3b298ace59bee6ae90030dfff400786d5cac98b9fcc231df71fd0bb1
-
SHA512
5df9f87959fd28ac3c813fb34233945edf1704c3a330eebcffee4cc2db77d0398d2039e958645eaf6d5c767a088d7114b560f9ce46c7dd77517d871c1524fa86
Static task
static1
Behavioral task
behavioral1
Sample
9af5491c3b298ace59bee6ae90030dfff400786d5cac98b9fcc231df71fd0bb1.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/ROMs/MAME4all/feng_ddragonb/gamelist.txt
ryuk
Targets
-
-
Target
9af5491c3b298ace59bee6ae90030dfff400786d5cac98b9fcc231df71fd0bb1
-
Size
6.9MB
-
MD5
fadbdb7caacb97f37869beeba102bc6d
-
SHA1
884af4719b145c5123355391656d8c3dd23edb5e
-
SHA256
9af5491c3b298ace59bee6ae90030dfff400786d5cac98b9fcc231df71fd0bb1
-
SHA512
5df9f87959fd28ac3c813fb34233945edf1704c3a330eebcffee4cc2db77d0398d2039e958645eaf6d5c767a088d7114b560f9ce46c7dd77517d871c1524fa86
Score10/10-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-