General
-
Target
0c644ade9cd8ac34d457431b91ba31cce5e824766621f3eab6c00d98f9634468
-
Size
16.6MB
-
Sample
220718-wevbxadbar
-
MD5
ba1b02e04f30835f58ec9fc041450502
-
SHA1
7766bd1bac3c6a9d31443d4ae079dfc97a7c0fac
-
SHA256
0c644ade9cd8ac34d457431b91ba31cce5e824766621f3eab6c00d98f9634468
-
SHA512
4c9c9684a4b0367b7fc14b2d2874b2d4d3bc6d1b451ed32a7a5e70b630073b1405130ac93bcb790a5fab4a612c270eecdf75ca4b866fcb110ef8dc5251167d4d
Static task
static1
Behavioral task
behavioral1
Sample
0c644ade9cd8ac34d457431b91ba31cce5e824766621f3eab6c00d98f9634468.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/zymame/gamelist.txt
ryuk
Targets
-
-
Target
0c644ade9cd8ac34d457431b91ba31cce5e824766621f3eab6c00d98f9634468
-
Size
16.6MB
-
MD5
ba1b02e04f30835f58ec9fc041450502
-
SHA1
7766bd1bac3c6a9d31443d4ae079dfc97a7c0fac
-
SHA256
0c644ade9cd8ac34d457431b91ba31cce5e824766621f3eab6c00d98f9634468
-
SHA512
4c9c9684a4b0367b7fc14b2d2874b2d4d3bc6d1b451ed32a7a5e70b630073b1405130ac93bcb790a5fab4a612c270eecdf75ca4b866fcb110ef8dc5251167d4d
Score10/10-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-