General

  • Target

    6783c6a1b5bf0e582205e60ccf083bf29b30454428815c15131b2bf849899f84.apk.zip

  • Size

    17.5MB

  • MD5

    a9fff8ec66b30897154b4e5941254d48

  • SHA1

    d4e87657f849502c7a98a61a1e246399724cddd4

  • SHA256

    c09fedb4106bd2ddc4b5b2d5e36ec70d958f3fbad8ad7b8912b82b029aed72db

  • SHA512

    54e3c1c7b5a377d64a8ea5e7c058091e0503b5c7e64bc3252c3addf5471a0ede31e1ea4e15c6d11080735a2273b6e4b895826b60363110c5fced7d4bf690efdf

  • SSDEEP

    393216:ddwYUbZEoCJIpLhkSDCUQMJgXjaKOlBdAkSy5NcFsMZ8tZZJhlgwV:wxEoXpt/DdsX2KsSyfcFsM+tvJrX

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • 6783c6a1b5bf0e582205e60ccf083bf29b30454428815c15131b2bf849899f84.apk.zip
    .zip

    Password: infected

  • 6783c6a1b5bf0e582205e60ccf083bf29b30454428815c15131b2bf849899f84.apk
    .apk android arch:arm arch:x86

    com.busydev.audiocutter

    com.busydev.audiocutter.SplashActivity


  • Roboto-Regular.ttf
  • RobotoCondensed-Bold.ttf
  • aparat.js
    .js
  • aps-mraid.js
    .js
  • aps_mobile_client_config.json
  • cineb.js
    .js
  • clipwatch.js
    .js
  • dtb-m.js
    .js
  • index.android.bundle
    .js
  • index.android.bundle.meta
  • mixdrop.js
    .js
  • openload.js
    .js
  • primewire.js
    .js
  • upstream.js
    .js
  • verdana.ttf
  • videobin.js
    .js
  • vidlox.js
    .js
  • vidoza.js
    .js