General

  • Target

    e490fe449efaed0878abf5c16878fee1fde2b5f528b80dc5c4c9d32e5411d4a2.apk.zip

  • Size

    14.9MB

  • MD5

    830e7859b37449e0b36244929feb1eb4

  • SHA1

    79da7508a74491d897782be97582bbf49dcf91cf

  • SHA256

    1229bc986c65ae934de4d0425aef24ed9274a893ffa045bd7e353a7d46ccf694

  • SHA512

    6ded3de7f15d248133423ffa2a59e2ea26c71037a8b456eb2e8939cad7e4e7eeb3899885ef1350a0104ace9246a240c5d1efa5cdff2488005daf2bd1d0b29981

  • SSDEEP

    393216:bPf4aGO+bh1wU70UJtwWW0sK2siKgSTs65U:t+bh1Z70cW30sKGKgSTvm

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • e490fe449efaed0878abf5c16878fee1fde2b5f528b80dc5c4c9d32e5411d4a2.apk.zip
    .zip

    Password: infected

  • e490fe449efaed0878abf5c16878fee1fde2b5f528b80dc5c4c9d32e5411d4a2.apk
    .apk android arch:arm

    com.free.unlimited.lemon.vpn

    com.lemon.vpn.tool.SplashActivity


  • bypass-china.acl
  • bypass-lan-china.acl
  • bypass-lan.acl
  • china-list.acl
  • cid
    .elf linux x86
  • consentform.html
    .html .js
  • gfwlist.acl
  • tt_mime_type.pro
  • vcall.acl