General

  • Target

    9e902a09bcb4cc803763ebffaa644c2111bee180e76d7dc82ffa3c7013ac2abb.apk.zip

  • Size

    17.5MB

  • MD5

    8ca49dfd52488a2aaf4591aa6e1a79d6

  • SHA1

    1ac69e02553378996aaf24e108e3a95248ea0c44

  • SHA256

    a12490a7bbc7fef123ebee1264da8bf0567de1edbe02582aea002643e9d0477d

  • SHA512

    e9c626800993ff0da898124bd19654a08fe49340842b87dfe3cf280ce2029e01a19bfc01db096b8b4a456fc96d13ab81e94daa50b98f94e463cc36d13f9b9fdd

  • SSDEEP

    393216:YxtjOgllKYODGsFI0b/osTvThNTuZtl4xMsRa8hapGwHxeXgsgRp+j2KiZ:wty+KVGsxbQE7PuZtlpD8z0IXiQHiZ

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • 9e902a09bcb4cc803763ebffaa644c2111bee180e76d7dc82ffa3c7013ac2abb.apk.zip
    .zip

    Password: infected

  • 9e902a09bcb4cc803763ebffaa644c2111bee180e76d7dc82ffa3c7013ac2abb.apk
    .apk android arch:arm arch:x86

    com.busydev.audiocutter

    com.busydev.audiocutter.SplashActivity


  • Roboto-Regular.ttf
  • RobotoCondensed-Bold.ttf
  • aparat.js
    .js
  • aps-mraid.js
    .js
  • aps_mobile_client_config.json
  • cineb.js
    .js
  • clipwatch.js
    .js
  • dtb-m.js
    .js
  • index.android.bundle
    .js
  • index.android.bundle.meta
  • mixdrop.js
    .js
  • openload.js
    .js
  • primewire.js
    .js
  • upstream.js
    .js
  • verdana.ttf
  • videobin.js
    .js
  • vidlox.js
    .js
  • vidoza.js
    .js