General
-
Target
50641eba0e6b563623cd5c2b8a75c2cc6f17536e7b3ccc73cd557f17a04eae03
-
Size
7.2MB
-
Sample
220718-yejlhsgabq
-
MD5
68d85fb1c199facf87def6ad10e466df
-
SHA1
34b6a137ce6fbf7e997af6c740570b1db7df9cbd
-
SHA256
50641eba0e6b563623cd5c2b8a75c2cc6f17536e7b3ccc73cd557f17a04eae03
-
SHA512
61114571b4edc81cc9f49f5b89015704d1c72f3cb8e50c2f1dfb98073679d975fba65bf228ed439f6b779d215dbc37f8f19655fbf242d426f93397affceae79f
Static task
static1
Behavioral task
behavioral1
Sample
50641eba0e6b563623cd5c2b8a75c2cc6f17536e7b3ccc73cd557f17a04eae03.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/ROMs/MAME4all/feng_powj/gamelist.txt
ryuk
Targets
-
-
Target
50641eba0e6b563623cd5c2b8a75c2cc6f17536e7b3ccc73cd557f17a04eae03
-
Size
7.2MB
-
MD5
68d85fb1c199facf87def6ad10e466df
-
SHA1
34b6a137ce6fbf7e997af6c740570b1db7df9cbd
-
SHA256
50641eba0e6b563623cd5c2b8a75c2cc6f17536e7b3ccc73cd557f17a04eae03
-
SHA512
61114571b4edc81cc9f49f5b89015704d1c72f3cb8e50c2f1dfb98073679d975fba65bf228ed439f6b779d215dbc37f8f19655fbf242d426f93397affceae79f
Score10/10-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-