General

  • Target

    b160568d55328ee0f485a6603343c0f991b4a14b2be5a9a90e6d24f78bee376d.apk.zip

  • Size

    18.8MB

  • MD5

    c1bc5afb5a980605f96b8554485e6352

  • SHA1

    7bc12a0a1037e26d87b4d27946f0994e46c760e5

  • SHA256

    5dbcfecebe18cad343ad01f2f754674d704c5fae91a536311ca5c0341eea044f

  • SHA512

    8fc547e70e2498cb72742c032d98ff861b41021a744d65604a7a010aecb6d9c66032e20b1e83e530ec5b424a497cc4cac126714c5d2de6be68740e8b7923cc93

  • SSDEEP

    393216:x6CDThqiqXq/Xtp4xyM14a9n7tkDUUu/eIA1y5aFgnSbc:VqXc0xy84aJxkDUeIA1fWwc

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • b160568d55328ee0f485a6603343c0f991b4a14b2be5a9a90e6d24f78bee376d.apk.zip
    .zip

    Password: infected

  • b160568d55328ee0f485a6603343c0f991b4a14b2be5a9a90e6d24f78bee376d.apk
    .apk android arch:arm arch:x86

    com.busydev.audiocutter

    com.busydev.audiocutter.SplashActivity


  • Roboto-Regular.ttf
  • RobotoCondensed-Bold.ttf
  • aparat.js
    .js
  • aps-mraid.js
    .js
  • aps_mobile_client_config.json
  • cineb.js
    .js
  • clipwatch.js
    .js
  • dtb-m.js
    .js
  • index.android.bundle
    .js
  • index.android.bundle.meta
  • mixdrop.js
    .js
  • openload.js
    .js
  • upstream.js
    .js
  • verdana.ttf
  • videobin.js
    .js
  • vidlox.js
    .js
  • vidoza.js
    .js