General

  • Target

    base.apk

  • Size

    1.8MB

  • MD5

    3f9c00569fffe07ae2d92aa597f6cd7f

  • SHA1

    ec498c5d85f61a9ba6a6a04a2ef249c109a1d065

  • SHA256

    a7151099e1c44a2a7e6695e3c0d135012cbae04390bb52d1a56f8c2818a6f6a0

  • SHA512

    cbf6f1eed72a86aeb572d73eb3d4b82a49b6e84a8b692e47aad26e51a55f15c701cc5be1ed19a645bb5e4dd75399e0f134c7bf2d5de4eb39c056808d7fb410ae

  • SSDEEP

    49152:Gva5sy/NXeHjAQkLbqS/uPN+XtjNbZSJ/0i:Gv6EHjPsqQuMb08i

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 4 IoCs

Files

  • base.apk
    .apk android

    edward.org

    .main


Android Permissions

base.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

edward.org.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS