General

  • Target

    5d360365f36b3bbfa01fff50708e0219c6917e06d4337244d8dbd89f4997a610

  • Size

    1.4MB

  • MD5

    89b5190c68bb9412604739432d1d8dbb

  • SHA1

    0968a28059ba0c6675993ecc9e406ec771389054

  • SHA256

    5d360365f36b3bbfa01fff50708e0219c6917e06d4337244d8dbd89f4997a610

  • SHA512

    de0cba1bd44730436f71f2012a195ecca192295182830a2e5890295c73882ed9a7e3a60cb2bbeddf029f87bd9bff3ac3f8915c3ab047fae4ed8fa901578ec8a2

  • SSDEEP

    24576:p2kg1PysH1IG/lJSrxmHM/joO66bxJhHQgBtTGb2UexfSXQ9A:ckOKG/TgxYojVbFrHQg+b2UEST

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 5d360365f36b3bbfa01fff50708e0219c6917e06d4337244d8dbd89f4997a610
    .apk android

    com.yiti.alzo.vqaq

    com.tencent.xdd.MainActivity


Android Permissions

5d360365f36b3bbfa01fff50708e0219c6917e06d4337244d8dbd89f4997a610

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.GET_TASKS

android.permission.INTERNET

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.SYSTEM_OVERLAY_WINDOW

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS