General

  • Target

    2821925e299a2181053b34b07c24a174fa8945e35d4fc470175ccf7deffe25da.apk.zip

  • Size

    17.2MB

  • MD5

    cedaead2a30000f447dad2d6dd73bad0

  • SHA1

    656d309043f65140b7755c088c49d1675f13635d

  • SHA256

    313ffb80ca196a4bf0ca0f4444601ab6189afc017e121622929a6738693e5ccb

  • SHA512

    93ca2ba7d95980df99fbd0da58848f9d7e5ec7cf85ec027561c84779e83c4c4e9a9932a656d3310871254eed0621bbd9235b1793035d4322d1b0e487d6074d66

  • SSDEEP

    393216:CanpQx4AUuJfNMRXWWoy6qT9onX8I7pOf8vyAK:9pQL9tC1WWDOnM8kbl

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • 2821925e299a2181053b34b07c24a174fa8945e35d4fc470175ccf7deffe25da.apk.zip
    .zip

    Password: infected

  • 2821925e299a2181053b34b07c24a174fa8945e35d4fc470175ccf7deffe25da.apk
    .apk android arch:arm arch:x86

    com.busydev.audiocutter

    com.busydev.audiocutter.SplashActivity


  • Roboto-Regular.ttf
  • RobotoCondensed-Bold.ttf
  • aparat.js
    .js
  • aps-mraid.js
    .js
  • aps_mobile_client_config.json
  • cineb.js
    .js
  • clipwatch.js
    .js
  • dtb-m.js
    .js
  • index.android.bundle
    .js
  • index.android.bundle.meta
  • mixdrop.js
    .js
  • openload.js
    .js
  • upstream.js
    .js
  • verdana.ttf
  • videobin.js
    .js
  • vidlox.js
    .js
  • vidoza.js
    .js