General
-
Target
jiomart_signed-avlp7d2x3gcjqjbw-3-AVLPayb12yTGl80D.apk
-
Size
10.3MB
-
Sample
230328-pe9chace7y
-
MD5
4d1767da11cc44c3caffc6f7f7b42d91
-
SHA1
9265e4e0f7888fa3a8112744fdf4fdcdbd186aa4
-
SHA256
203171d39a081c7a2f3bd25b6b6e5ea69550292a75cc042d6daf35f02de98dc9
-
SHA512
cb18ffb61280ef1a44cbd3ac582add4dcd177378a12d33b75e22ec6bb712fac7906925b19d4c0816cee2aefaf367448fb7955e65972135ed255c7574835fdfb6
-
SSDEEP
196608:eI32MZzdBpoqlvSOwswAZcZmmlW53dSouO6JHHaMR8gUAPw3tuhIJ:pPqbOwrVng3oouhLRZUBtF
Static task
static1
Behavioral task
behavioral1
Sample
jiomart_signed-avlp7d2x3gcjqjbw-3-AVLPayb12yTGl80D.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
jiomart_signed-avlp7d2x3gcjqjbw-3-AVLPayb12yTGl80D.apk
-
Size
10.3MB
-
MD5
4d1767da11cc44c3caffc6f7f7b42d91
-
SHA1
9265e4e0f7888fa3a8112744fdf4fdcdbd186aa4
-
SHA256
203171d39a081c7a2f3bd25b6b6e5ea69550292a75cc042d6daf35f02de98dc9
-
SHA512
cb18ffb61280ef1a44cbd3ac582add4dcd177378a12d33b75e22ec6bb712fac7906925b19d4c0816cee2aefaf367448fb7955e65972135ed255c7574835fdfb6
-
SSDEEP
196608:eI32MZzdBpoqlvSOwswAZcZmmlW53dSouO6JHHaMR8gUAPw3tuhIJ:pPqbOwrVng3oouhLRZUBtF
Score7/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-