General
-
Target
a83ae6e9941ce6ff3938f1e8cded7ef0eb54b642002181e028eb03c48f05092b
-
Size
7.1MB
-
Sample
220718-wp566adecr
-
MD5
b013e4fc733082011402646beccfe1c5
-
SHA1
073dc4b92153cd2b603d1326d0d77856bd68f792
-
SHA256
a83ae6e9941ce6ff3938f1e8cded7ef0eb54b642002181e028eb03c48f05092b
-
SHA512
0cb4e529eb702b9bf858ffd46857486ea3dd98ad09b1d9cf4a9acb771b4155a2a318c5210b7df7b4bab2e7f1c2362cc0dca2b3548c39bb8625aa502c65eb7d15
Static task
static1
Behavioral task
behavioral1
Sample
a83ae6e9941ce6ff3938f1e8cded7ef0eb54b642002181e028eb03c48f05092b.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/ROMs/MAME4all/feng_devstor3/gamelist.txt
ryuk
Targets
-
-
Target
a83ae6e9941ce6ff3938f1e8cded7ef0eb54b642002181e028eb03c48f05092b
-
Size
7.1MB
-
MD5
b013e4fc733082011402646beccfe1c5
-
SHA1
073dc4b92153cd2b603d1326d0d77856bd68f792
-
SHA256
a83ae6e9941ce6ff3938f1e8cded7ef0eb54b642002181e028eb03c48f05092b
-
SHA512
0cb4e529eb702b9bf858ffd46857486ea3dd98ad09b1d9cf4a9acb771b4155a2a318c5210b7df7b4bab2e7f1c2362cc0dca2b3548c39bb8625aa502c65eb7d15
Score10/10-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-