General

  • Target

    01da791043ed173641d221fe9a5a474961fe305ef5e10359db35ab0076a6249e.apk.zip

  • Size

    19.1MB

  • MD5

    534cd07788689a471e9dcf2033012998

  • SHA1

    20dbc99ad8b107e4ac53f5cc06467d6851f9fbe3

  • SHA256

    dddf576229efe5062a42e023f57cd32c0e649add013aff330c2e15cb09a30246

  • SHA512

    c000d5e9f2b04254f96a2a0740fcc118e38caa8bfe7cbad0b325718a403865ee960b6a1631904961b893abe7d8e5cfd9601767bcd84bf598716dc32903c42b91

  • SSDEEP

    393216:SW2ZXZGlqGLCPN0KPcfLyz498ztYVcBtX91fc581NnmjYAOBK:FO0cN0KPELy0GqVcBtNXnmjYvY

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 01da791043ed173641d221fe9a5a474961fe305ef5e10359db35ab0076a6249e.apk.zip
    .zip

    Password: infected

  • 01da791043ed173641d221fe9a5a474961fe305ef5e10359db35ab0076a6249e.apk
    .apk android arch:x86 arch:arm arch:x64 arch:arm64

    com.fortinet.forticlient_fa

    forticlient.start.bringtofront.BringToFrontStartActivity


  • _
    .gz
  • _
    .tar
  • _/ftnt.ks
  • cacert.pem
  • config
  • dhcd-hooks/20-dns.conf
    .sh linux
  • dhcd-hooks/95-configured
    .sh linux
  • dhcd-run-hooks
    .sh linux
  • dhcd.conf
  • fortisslcacert.pem
  • fortisslclient.crt
  • fortisslclient.key
  • ip-up
    .sh linux
  • server.crt
  • server.key