General
-
Target
5295a41d9e1e1ab47fb48ee949813f61fd71bf38a33d8b14e2da3ff4167e1270
-
Size
6.4MB
-
Sample
221127-ptnz4scc9y
-
MD5
280ea4fa6ac91541d76c8c79ae6311dc
-
SHA1
ac879e473aebb5e1401b64caef948715a3fb195d
-
SHA256
5295a41d9e1e1ab47fb48ee949813f61fd71bf38a33d8b14e2da3ff4167e1270
-
SHA512
a59c82f3dc28839de4404772116457695afdb39b8e11440a874591788e39c087f8f5c2d02975480cb3ccf6891c1fe01a292fc39f9b11bb330119c3f9f8e6a688
-
SSDEEP
196608:MH1Rj74eHqeAmiU9rt1gRx0zSBIZk/51RmsVK80lrDJ6KP:Y1R34UzhiUxgE2BZ/575880lZ6KP
Static task
static1
Behavioral task
behavioral1
Sample
5295a41d9e1e1ab47fb48ee949813f61fd71bf38a33d8b14e2da3ff4167e1270.apk
Resource
android-x86-arm-20220823-en
Malware Config
Targets
-
-
Target
5295a41d9e1e1ab47fb48ee949813f61fd71bf38a33d8b14e2da3ff4167e1270
-
Size
6.4MB
-
MD5
280ea4fa6ac91541d76c8c79ae6311dc
-
SHA1
ac879e473aebb5e1401b64caef948715a3fb195d
-
SHA256
5295a41d9e1e1ab47fb48ee949813f61fd71bf38a33d8b14e2da3ff4167e1270
-
SHA512
a59c82f3dc28839de4404772116457695afdb39b8e11440a874591788e39c087f8f5c2d02975480cb3ccf6891c1fe01a292fc39f9b11bb330119c3f9f8e6a688
-
SSDEEP
196608:MH1Rj74eHqeAmiU9rt1gRx0zSBIZk/51RmsVK80lrDJ6KP:Y1R34UzhiUxgE2BZ/575880lZ6KP
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data).
-