General
-
Target
3c19b89bf153e83bcb03ac75cd811e68bda4beca915e9f24ef54f64789d356d8
-
Size
7.4MB
-
Sample
220718-wtp1qscea4
-
MD5
ac23d70bd87cb02977c6da15e234e89f
-
SHA1
6073304ac7ce8482ae9e39c1cb115b8fc4dc4a37
-
SHA256
3c19b89bf153e83bcb03ac75cd811e68bda4beca915e9f24ef54f64789d356d8
-
SHA512
d5b157432d2bb0d241854d19df9c35fa0404a98c57494112ad3bacbc65a3a90f4b2f623a612878b9df090de5e341afa4f321d76b03aacfae994b777d4fc9b74f
Static task
static1
Behavioral task
behavioral1
Sample
3c19b89bf153e83bcb03ac75cd811e68bda4beca915e9f24ef54f64789d356d8.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/zymame/gamelist.txt
ryuk
Targets
-
-
Target
3c19b89bf153e83bcb03ac75cd811e68bda4beca915e9f24ef54f64789d356d8
-
Size
7.4MB
-
MD5
ac23d70bd87cb02977c6da15e234e89f
-
SHA1
6073304ac7ce8482ae9e39c1cb115b8fc4dc4a37
-
SHA256
3c19b89bf153e83bcb03ac75cd811e68bda4beca915e9f24ef54f64789d356d8
-
SHA512
d5b157432d2bb0d241854d19df9c35fa0404a98c57494112ad3bacbc65a3a90f4b2f623a612878b9df090de5e341afa4f321d76b03aacfae994b777d4fc9b74f
Score10/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-