General
-
Target
74a8820541d9e3ba40ff05c40506643d04ecd80453aee2d1dbf782aba4339a41
-
Size
7.3MB
-
Sample
220718-z3kzxsaccn
-
MD5
09af6d70b60df6ce8cf581e80ec96719
-
SHA1
e1ac7f74b5eacfbd8d981e0e62f826d169b726e9
-
SHA256
74a8820541d9e3ba40ff05c40506643d04ecd80453aee2d1dbf782aba4339a41
-
SHA512
96d24ed0a63a219607f85166451f07030bcff81c0002b8064bd30abfe4ba796be62000cc93afd39f5c7b493d82eb08d74cf58c10180001a3b38253ff3a0b2986
Static task
static1
Behavioral task
behavioral1
Sample
74a8820541d9e3ba40ff05c40506643d04ecd80453aee2d1dbf782aba4339a41.apk
Resource
android-x86-arm-20220621-en
Malware Config
Extracted
/storage/emulated/0/zymame/gamelist.txt
ryuk
Targets
-
-
Target
74a8820541d9e3ba40ff05c40506643d04ecd80453aee2d1dbf782aba4339a41
-
Size
7.3MB
-
MD5
09af6d70b60df6ce8cf581e80ec96719
-
SHA1
e1ac7f74b5eacfbd8d981e0e62f826d169b726e9
-
SHA256
74a8820541d9e3ba40ff05c40506643d04ecd80453aee2d1dbf782aba4339a41
-
SHA512
96d24ed0a63a219607f85166451f07030bcff81c0002b8064bd30abfe4ba796be62000cc93afd39f5c7b493d82eb08d74cf58c10180001a3b38253ff3a0b2986
Score10/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-