General

  • Target

    2c0e25a9677d6b8271561e3d33ed7e377ff4ca95681e0f3c2e493b36ed39dece

  • Size

    56KB

  • MD5

    34f11c91d30e2587feb8ffd2743c1220

  • SHA1

    5b99865ce8cf5591ab564512234cc72d267940e8

  • SHA256

    2c0e25a9677d6b8271561e3d33ed7e377ff4ca95681e0f3c2e493b36ed39dece

  • SHA512

    f56036fced3b331225b6964ab6239c7be115392c31c847443286d1d748c63cb286647ec9115419d344eecc73525e6550891181b0a5a9b9d2c71b3c8d1a2b98ad

  • SSDEEP

    1536:DczhlWGEdamPA9Fs/Bc6Nws/jYHDbPLp9nbfug:ozhAddDPaFwbN/jcDD19ag

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 2c0e25a9677d6b8271561e3d33ed7e377ff4ca95681e0f3c2e493b36ed39dece
    .apk android

    nl.rogro.GScriptLite

    .GScript


Android Permissions

2c0e25a9677d6b8271561e3d33ed7e377ff4ca95681e0f3c2e493b36ed39dece

Permissions

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_COARSE_LOCATION