General

  • Target

    23ce6e17dfa56e633a7cab0198034f6d5ee8e1bd36daa970c2699ee1be48bbde.apk.zip

  • Size

    17.5MB

  • MD5

    3e93beeac62e9dbd97f01059c470740f

  • SHA1

    fc33c8262dec928b01f5cd6cf0ae8288598148ea

  • SHA256

    fa2bba9981f965f3f7168b4e95f1c7b5b5fb4e2a1ce8b855df362a57ca56cedc

  • SHA512

    8502e0a6d11ad7baaf87db4c4636ba3b2366d82b1c34d277479d0bdbe1f5406d1cda1e8850128d7f2c49ce04290cf064dd71b3b7cc7f19aaa131a2c5ae650cda

  • SSDEEP

    393216:PUUNK6tbQKT5UkVizmPB2C/oBcPoJTrmIcbQ+LICj8livDr:PleKT5UkViS0C/oBcPo1KFbQ+8wr

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • 23ce6e17dfa56e633a7cab0198034f6d5ee8e1bd36daa970c2699ee1be48bbde.apk.zip
    .zip

    Password: infected

  • 23ce6e17dfa56e633a7cab0198034f6d5ee8e1bd36daa970c2699ee1be48bbde.apk
    .apk android arch:arm arch:x86

    com.busydev.audiocutter

    com.busydev.audiocutter.SplashActivity


  • Roboto-Regular.ttf
  • RobotoCondensed-Bold.ttf
  • aparat.js
    .js
  • aps-mraid.js
    .js
  • aps_mobile_client_config.json
  • cineb.js
    .js
  • clipwatch.js
    .js
  • dtb-m.js
    .js
  • index.android.bundle
    .js
  • index.android.bundle.meta
  • mixdrop.js
    .js
  • openload.js
    .js
  • primewire.js
    .js
  • upstream.js
    .js
  • verdana.ttf
  • videobin.js
    .js
  • vidlox.js
    .js
  • vidoza.js
    .js