General
-
Target
a0c49753d2d6efd337a72b2d870559494a9257f0bed023fc2b39308692f32b1d
-
Size
7.5MB
-
Sample
220718-vjnt9abhbk
-
MD5
d97a9e92757b44efe6a7907d3468f72e
-
SHA1
2b29752336fc83f9c0b1790d8f7096916d578b4b
-
SHA256
a0c49753d2d6efd337a72b2d870559494a9257f0bed023fc2b39308692f32b1d
-
SHA512
1db347fe7e0f9e5c76215f4e43461bd285b8920cef0d5505faa52cb826df8ef949fea380d0122ce17833f33d0454eb0c98a7f5071a8078425b239c7a16bdbc05
Static task
static1
Behavioral task
behavioral1
Sample
a0c49753d2d6efd337a72b2d870559494a9257f0bed023fc2b39308692f32b1d.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/zymame/gamelist.txt
ryuk
Targets
-
-
Target
a0c49753d2d6efd337a72b2d870559494a9257f0bed023fc2b39308692f32b1d
-
Size
7.5MB
-
MD5
d97a9e92757b44efe6a7907d3468f72e
-
SHA1
2b29752336fc83f9c0b1790d8f7096916d578b4b
-
SHA256
a0c49753d2d6efd337a72b2d870559494a9257f0bed023fc2b39308692f32b1d
-
SHA512
1db347fe7e0f9e5c76215f4e43461bd285b8920cef0d5505faa52cb826df8ef949fea380d0122ce17833f33d0454eb0c98a7f5071a8078425b239c7a16bdbc05
Score10/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-