General
-
Target
7482ef4222f9ae7ffde4f32c978e9c5d66600db123fbc2494db888e1fdf3d549
-
Size
7.5MB
-
Sample
220718-vm19raafh6
-
MD5
d6367b1e40f6634927b9c6ca9fb06e7d
-
SHA1
79cce4d089ab31aa8fc1542188b26bd3b77aa932
-
SHA256
7482ef4222f9ae7ffde4f32c978e9c5d66600db123fbc2494db888e1fdf3d549
-
SHA512
ee07911fa67d2eae822c8356e80de962df73ab4f1e6a56db769b622c44a7ad24b424e27c0b377079937eaddef2a0513f7f6cf2f5fe329f07c37cee204ca4b1e9
Static task
static1
Behavioral task
behavioral1
Sample
7482ef4222f9ae7ffde4f32c978e9c5d66600db123fbc2494db888e1fdf3d549.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/zymame/gamelist.txt
ryuk
Targets
-
-
Target
7482ef4222f9ae7ffde4f32c978e9c5d66600db123fbc2494db888e1fdf3d549
-
Size
7.5MB
-
MD5
d6367b1e40f6634927b9c6ca9fb06e7d
-
SHA1
79cce4d089ab31aa8fc1542188b26bd3b77aa932
-
SHA256
7482ef4222f9ae7ffde4f32c978e9c5d66600db123fbc2494db888e1fdf3d549
-
SHA512
ee07911fa67d2eae822c8356e80de962df73ab4f1e6a56db769b622c44a7ad24b424e27c0b377079937eaddef2a0513f7f6cf2f5fe329f07c37cee204ca4b1e9
Score10/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-