General

  • Target

    8a32373253b4096ca072b85f0e476ba8.bin

  • Size

    9.0MB

  • MD5

    db1098cf5ce4dd01b0c65e4244ecd3eb

  • SHA1

    c6c0005ed31f254ef389d1a03d9209ebf1c788f2

  • SHA256

    2e01dea51d657079014aa2573d7ef06d8061e7269fff9c1f008551927ff927fe

  • SHA512

    68ed84bcfc419b883f9e12e9eb12434a0d6a21aaf675bfa2a8a36200a7276fc5bb4aa8e80521381cf24b01122a6a13d3d13669f9e068325cee5f8cdffbce7cb2

  • SSDEEP

    196608:MBoSRqd02ywZQxju8a9D1oS2mABnMsKaUh8bYpXG6Ojio:MBoSkysZ+juhoPnBnM1JppWN

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 8 IoCs

Files

  • 8a32373253b4096ca072b85f0e476ba8.bin
    .zip

    Password: infected

  • c2c29a35f3202b750d2bdc8eece7f4a117bdddade7238941d92f7e8ef731d000.apk
    .apk android

    Password: infected

    com.filemaster.nx.manager

    com.filemaster.nx.manager.activity.EventtXcAppqActivityz


  • baseline.prof
  • baseline.profm
  • cid
    .elf linux x86
  • dt-mraid-video-controller.js
    .js
  • dt-omsdk-mraid-video-tracker.js
    .js
  • end_anim.json
  • features_config.json
  • fyb_iframe_endcard_tmpl.html
    .html
  • fyb_static_endcard_tmpl.html
    .js
  • ia_js_load_monitor.txt
    .html .js
  • ia_mraid_bridge.txt
    .html .js
  • n_anim.json
  • omid-session-client-v1.js
    .js
  • rv_binddatas.xml
    .xml
  • s_anim.json
  • tt_mime_type.pro
  • vpaid_html_template.html
    .html .js
  • w_anim.json