Failed to run the processing module "Static" for task #6676723: Traceback (most recent call last): File "/usr/local/lib/python2.7/dist-packages/cuckoo/core/plugins.py", line 250, in process data = current.run() File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/static.py", line 1611, in run static["apkinfo"] = AndroidPackage(f.file_path).run() File "/usr/local/lib/python2.7/dist-packages/cuckoo/processing/static.py", line 1502, in run self.apk, _, self.analysis = AnalyzeAPK(self.filepath) File "/usr/local/lib/python2.7/dist-packages/androguard/misc.py", line 63, in AnalyzeAPK a = APK(_file, raw=raw) File "/usr/local/lib/python2.7/dist-packages/androguard/core/bytecodes/apk.py", line 294, in __init__ self._apk_analysis() File "/usr/local/lib/python2.7/dist-packages/androguard/core/bytecodes/apk.py", line 313, in _apk_analysis manifest_data = self.zip.read(i) File "/usr/lib/python2.7/zipfile.py", line 958, in read return self.open(name, "r", pwd).read() File "/usr/lib/python2.7/zipfile.py", line 1013, in open "password required for extraction" % name RuntimeError: File AndroidManifest.xml is encrypted, password required for extraction
click to expand / collapse this errorSize | 7.4MB |
---|---|
Type | Zip archive data, at least v0.0 to extract, compression method=deflate |
MD5 | 897e406a30d3bedf3709c9c9a669ccf2 |
SHA1 | 4ad64093289b96242a4a44b2fe4319e459cc7558 |
SHA256 | f9d4615b36748fa4754ad5ce34992f408c63004f6fc61286a74645fc83169c9b |
SHA512 |
83dee7faaa8919dc79c2f62d3fec350bb53cea6a7e5a5b8d5ad1b66ee5764727f1af03e83a21db3c5a154055c5a4fabdfba7e9faf13a0e9949791fcebda354bf
|
CRC32 | FCAADEC4 |
ssdeep | None |
Yara | None matched |
This file is very suspicious, with a score of 10 out of 10!
Please notice: The scoring system is currently still in development and should be considered an alpha feature.
Expecting different results? Send us this analysis and we will inspect it. Click here
Category | Started | Completed | Duration | Routing | Logs |
---|---|---|---|---|---|
FILE | July 10, 2025, 2:56 a.m. | July 10, 2025, 3:01 a.m. | 275 seconds | internet |
Show Analyzer Log Show Cuckoo Log |
2025-07-07 23:07:08,015 [analyzer] DEBUG: Starting analyzer from: C:\tmpdyrg_l 2025-07-07 23:07:08,030 [analyzer] DEBUG: Pipe server name: \??\PIPE\YoYaozQndKXwPFAK 2025-07-07 23:07:08,030 [analyzer] DEBUG: Log pipe server name: \??\PIPE\CuMbukJgFGYGDZtwRFBXHm 2025-07-07 23:07:08,342 [analyzer] DEBUG: Started auxiliary module Curtain 2025-07-07 23:07:08,342 [analyzer] DEBUG: Started auxiliary module DbgView 2025-07-07 23:07:08,828 [analyzer] DEBUG: Started auxiliary module Disguise 2025-07-07 23:07:09,092 [analyzer] DEBUG: Loaded monitor into process with pid 500 2025-07-07 23:07:09,092 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets 2025-07-07 23:07:09,092 [analyzer] DEBUG: Started auxiliary module Human 2025-07-07 23:07:09,092 [analyzer] DEBUG: Started auxiliary module InstallCertificate 2025-07-07 23:07:09,108 [analyzer] DEBUG: Started auxiliary module Reboot 2025-07-07 23:07:09,217 [analyzer] DEBUG: Started auxiliary module RecentFiles 2025-07-07 23:07:09,217 [analyzer] DEBUG: Started auxiliary module Screenshots 2025-07-07 23:07:09,217 [analyzer] DEBUG: Started auxiliary module Sysmon 2025-07-07 23:07:09,217 [analyzer] DEBUG: Started auxiliary module LoadZer0m0n
2025-07-10 02:56:58,292 [cuckoo.core.scheduler] INFO: Task #6676723: acquired machine win7x6430 (label=win7x6430) 2025-07-10 02:56:58,294 [cuckoo.core.resultserver] DEBUG: Now tracking machine 192.168.168.230 for task #6676723 2025-07-10 02:56:58,641 [cuckoo.auxiliary.sniffer] INFO: Started sniffer with PID 3953152 (interface=vboxnet0, host=192.168.168.230) 2025-07-10 02:56:58,705 [cuckoo.common.objects] WARNING: Error extracting package and main activity: File AndroidManifest.xml is encrypted, password required for extraction. 2025-07-10 02:56:58,738 [cuckoo.machinery.virtualbox] DEBUG: Starting vm win7x6430 2025-07-10 02:56:59,504 [cuckoo.machinery.virtualbox] DEBUG: Restoring virtual machine win7x6430 to vmcloak 2025-07-10 02:58:55,268 [cuckoo.core.guest] INFO: Starting analysis #6676723 on guest (id=win7x6430, ip=192.168.168.230) 2025-07-10 02:58:56,275 [cuckoo.core.guest] DEBUG: win7x6430: not ready yet 2025-07-10 02:59:01,308 [cuckoo.core.guest] INFO: Guest is running Cuckoo Agent 0.10 (id=win7x6430, ip=192.168.168.230) 2025-07-10 02:59:01,408 [cuckoo.core.guest] DEBUG: Uploading analyzer to guest (id=win7x6430, ip=192.168.168.230, monitor=latest, size=6660546) 2025-07-10 02:59:03,206 [cuckoo.core.resultserver] DEBUG: Task #6676723: live log analysis.log initialized. 2025-07-10 02:59:04,253 [cuckoo.core.resultserver] DEBUG: Task #6676723 is sending a BSON stream 2025-07-10 02:59:05,593 [cuckoo.core.resultserver] DEBUG: Task #6676723: File upload for 'shots/0001.jpg' 2025-07-10 02:59:05,620 [cuckoo.core.resultserver] DEBUG: Task #6676723 uploaded file length: 133461 2025-07-10 02:59:05,807 [cuckoo.core.guest] WARNING: win7x6430: analysis #6676723 caught an exception Traceback (most recent call last): File "C:/tmpdyrg_l/analyzer.py", line 824, in <module> success = analyzer.run() File "C:/tmpdyrg_l/analyzer.py", line 673, in run pids = self.package.start(self.target) File "C:\tmpdyrg_l\modules\packages\zip.py", line 139, in start self.extract_zip(path, self.curdir, password, 0) File "C:\tmpdyrg_l\modules\packages\zip.py", line 95, in extract_zip "{0}".format(e)) CuckooPackageError: Unable to extract Zip file: ('Bad password for file', <zipfile.ZipInfo object at 0x03DF5920>) 2025-07-10 02:59:05,824 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Redsocks 2025-07-10 02:59:05,854 [cuckoo.core.plugins] DEBUG: Stopped auxiliary module: Sniffer 2025-07-10 02:59:06,759 [cuckoo.machinery.virtualbox] INFO: Successfully generated memory dump for virtual machine with label win7x6430 to path /srv/cuckoo/cwd/storage/analyses/6676723/memory.dmp 2025-07-10 02:59:06,761 [cuckoo.machinery.virtualbox] DEBUG: Stopping vm win7x6430 2025-07-10 03:01:33,318 [cuckoo.core.resultserver] DEBUG: Stopped tracking machine 192.168.168.230 for task #6676723 2025-07-10 03:01:33,319 [cuckoo.core.resultserver] DEBUG: Cancel <Context for LOG> for task 6676723 2025-07-10 03:01:33,709 [cuckoo.core.scheduler] DEBUG: Released database task #6676723 2025-07-10 03:01:33,740 [cuckoo.core.scheduler] INFO: Task #6676723: analysis procedure completed
WithSecure (Linux) | Malware.ANDROID/AVE.Evo.avvaaj |
ESET Security (Windows) | a variant of Android/TrojanDropper.Agent.MUY trojan |
Sophos Anti-Virus (Linux) | Andr/FakeApp-EX |
DrWeb Antivirus (Linux) | Android.Siggen.Susp.36064 |
Kaspersky Standard (Windows) | HEUR:Trojan-Spy.AndroidOS.SpyNote.dw |
ESET-NOD32 | a variant of Android/TrojanDropper.Agent.MUY |
Cynet | Malicious (score: 99) |
Kaspersky | HEUR:Trojan-Spy.AndroidOS.SpyNote.dw |
F-Secure | Malware.ANDROID/AVE.Evo.avvaaj |
DrWeb | Android.Siggen.Susp.36064 |
Sophos | Andr/FakeApp-EX |
Ikarus | Trojan-Dropper.AndroidOS.Agent |
Avast-Mobile | Android:Evo-gen [Trj] |
Jiangmin | TrojanSpy.AndroidOS.dtuw |
Avira | ANDROID/AVE.Evo.avvaaj |
ZoneAlarm | Andr/FakeApp-EX |
BitDefenderFalx | Android.Riskware.FakeApp.ABI |
AhnLab-V3 | Dropper/Android.Agent.1296702 |
TrellixENS | Artemis!BFC4E78B772F |
huorong | Trojan/Android.Agent.ce |
Fortinet | Android/Agent.MUY!tr |