General

  • Target

    3f142a5465a333d5d1ed859b0f06b85aca2b212170283e930cfe386f8bcdec45.apk.zip

  • Size

    17.5MB

  • MD5

    8063a625c61e87cc66eac3f886412670

  • SHA1

    aaa5b6f03f63812141c8b97187850f8f78970de3

  • SHA256

    53ac3eb339e1997e875a4542ce18d21bc00cbffb2fa2b6144a9b3b3a47cd3c81

  • SHA512

    3107d7852ea3087eceb59afd831ed5c78cc2791d05349dbbe67c5737853705ca0f7442479445b39cb53edb9f0e42f0fa74af06361317b01df284da1dc0c25641

  • SSDEEP

    393216:25SkdELbHV8TV5TVX82LAgHOXlTs2lcBj6dQQTlr9xC766at:pLbu55TtcgHOXloNB0Zhxm6z

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • 3f142a5465a333d5d1ed859b0f06b85aca2b212170283e930cfe386f8bcdec45.apk.zip
    .zip

    Password: infected

  • 3f142a5465a333d5d1ed859b0f06b85aca2b212170283e930cfe386f8bcdec45.apk
    .apk android arch:arm arch:x86

    com.busydev.audiocutter

    com.busydev.audiocutter.SplashActivity


  • Roboto-Regular.ttf
  • RobotoCondensed-Bold.ttf
  • aparat.js
    .js
  • aps-mraid.js
    .js
  • aps_mobile_client_config.json
  • cineb.js
    .js
  • clipwatch.js
    .js
  • dtb-m.js
    .js
  • index.android.bundle
    .js
  • index.android.bundle.meta
  • mixdrop.js
    .js
  • openload.js
    .js
  • primewire.js
    .js
  • upstream.js
    .js
  • verdana.ttf
  • videobin.js
    .js
  • vidlox.js
    .js
  • vidoza.js
    .js