General
-
Target
correos.apk
-
Size
8.3MB
-
Sample
201229-pzt7qjesxs
-
MD5
0b36088c51fa28ff276d812d1e6d20bd
-
SHA1
9483c1d487b674b4c57d035dedff63efc1c64ac5
-
SHA256
539889b68f27a908bd584851afe069402d61f9bf1beb5c2ba0240b5b875ac785
-
SHA512
19895949eb87ee00d2a4216460d26fe5852ae420d2f16dafd147a9baabded9a81f744d3f026ac4213ca205541dfdb4ebda47fd61bb19fd944cceb891d43963c3
Static task
static1
Behavioral task
behavioral1
Sample
correos.apk
Resource
android-x86_64
Malware Config
Extracted
Targets
-
-
Target
correos.apk
-
Size
8.3MB
-
MD5
0b36088c51fa28ff276d812d1e6d20bd
-
SHA1
9483c1d487b674b4c57d035dedff63efc1c64ac5
-
SHA256
539889b68f27a908bd584851afe069402d61f9bf1beb5c2ba0240b5b875ac785
-
SHA512
19895949eb87ee00d2a4216460d26fe5852ae420d2f16dafd147a9baabded9a81f744d3f026ac4213ca205541dfdb4ebda47fd61bb19fd944cceb891d43963c3
Score10/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads name of network operator
Uses Android APIs to discover system information.
-
Uses Crypto APIs (Might try to encrypt user data).
-