General
-
Target
5b377d73f0da400b8e5da33a701a9d5f7a42fe6aaaeb3f6fd996f4d5fbf1761b
-
Size
427KB
-
Sample
221011-ypzqgscbdr
-
MD5
056d4e0dee2ed3bae61a3f448d4a079c
-
SHA1
43a23cfc4fd5ae9b41f20734ff78d845254fe45b
-
SHA256
5b377d73f0da400b8e5da33a701a9d5f7a42fe6aaaeb3f6fd996f4d5fbf1761b
-
SHA512
f1be4472071583f3912232e555c47d5b9a64e4b6f580c6f6348159d19cfef44519963c7d392b5c578af211649a7237d2d8262b5852a4ba7c8d30f87ffe213757
-
SSDEEP
6144:S/cwt/wfktf1KrgnX28rxxim/m60lzNUXxTo7J1jSguZzdR4LxuzkM:62fktf1KrSX28Wm+HlKx6vSggBR4LoZ
Static task
static1
Behavioral task
behavioral1
Sample
5b377d73f0da400b8e5da33a701a9d5f7a42fe6aaaeb3f6fd996f4d5fbf1761b.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
5b377d73f0da400b8e5da33a701a9d5f7a42fe6aaaeb3f6fd996f4d5fbf1761b
-
Size
427KB
-
MD5
056d4e0dee2ed3bae61a3f448d4a079c
-
SHA1
43a23cfc4fd5ae9b41f20734ff78d845254fe45b
-
SHA256
5b377d73f0da400b8e5da33a701a9d5f7a42fe6aaaeb3f6fd996f4d5fbf1761b
-
SHA512
f1be4472071583f3912232e555c47d5b9a64e4b6f580c6f6348159d19cfef44519963c7d392b5c578af211649a7237d2d8262b5852a4ba7c8d30f87ffe213757
-
SSDEEP
6144:S/cwt/wfktf1KrgnX28rxxim/m60lzNUXxTo7J1jSguZzdR4LxuzkM:62fktf1KrSX28Wm+HlKx6vSggBR4LoZ
Score7/10-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-