General
-
Target
0d5dc0b022169cb1d8d7251857596186bda258cc367dca468e82bb93babb87e9
-
Size
6.7MB
-
Sample
220718-xda3baeebl
-
MD5
96a70398fbacf8bfeaeb3af455ef960a
-
SHA1
1a6a3eb1ebb79ecfb307e4752b6882c69dad20b6
-
SHA256
0d5dc0b022169cb1d8d7251857596186bda258cc367dca468e82bb93babb87e9
-
SHA512
4f4a5658df175579da8c5c72639f67b908afe72850a339a7fb8b49d60fa7ffbd8dd67b2ed7e72bf860a84d28c00e6235c0b7b4cd1e4f02e105fb835a64ac0339
Static task
static1
Behavioral task
behavioral1
Sample
0d5dc0b022169cb1d8d7251857596186bda258cc367dca468e82bb93babb87e9.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/ROMs/MAME4all/jackal/gamelist.txt
ryuk
Targets
-
-
Target
0d5dc0b022169cb1d8d7251857596186bda258cc367dca468e82bb93babb87e9
-
Size
6.7MB
-
MD5
96a70398fbacf8bfeaeb3af455ef960a
-
SHA1
1a6a3eb1ebb79ecfb307e4752b6882c69dad20b6
-
SHA256
0d5dc0b022169cb1d8d7251857596186bda258cc367dca468e82bb93babb87e9
-
SHA512
4f4a5658df175579da8c5c72639f67b908afe72850a339a7fb8b49d60fa7ffbd8dd67b2ed7e72bf860a84d28c00e6235c0b7b4cd1e4f02e105fb835a64ac0339
Score10/10-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-