General

  • Target

    2a8d5df6628718b5338c43bd2baf59300d9557359b7e2b3780f39f068dd3fc96.apk.zip

  • Size

    18.8MB

  • MD5

    5e30c75f1eecab09e8bdb972d3253062

  • SHA1

    ae137b050bf6fd97ac2c0329fab47ff0077fe731

  • SHA256

    99f4efc0fdfafb6a60a039964da93882713557e7b71b1e525584fb5b5e86edff

  • SHA512

    08d3262bc9959125abbca463cc706c0ccf3c09e220919495d2df67146942dde3763c09a7b7c285b058517d6a715ab31af9a28b5dfe1e75d8274eb57ea2c70194

  • SSDEEP

    393216:/xTmkRKiuK95Fuq4OlKe74yNSqF0XRc4/ja/mZNSexrLSwoqgV8YTNED:tNruq4O8A4yIqFWR2SSw6V8YTNED

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • 2a8d5df6628718b5338c43bd2baf59300d9557359b7e2b3780f39f068dd3fc96.apk.zip
    .zip

    Password: infected

  • 2a8d5df6628718b5338c43bd2baf59300d9557359b7e2b3780f39f068dd3fc96.apk
    .apk android arch:arm arch:x86

    com.busydev.audiocutter

    com.busydev.audiocutter.SplashActivity


  • Roboto-Regular.ttf
  • RobotoCondensed-Bold.ttf
  • aparat.js
    .js
  • aps-mraid.js
    .js
  • aps_mobile_client_config.json
  • cineb.js
    .js
  • clipwatch.js
    .js
  • dtb-m.js
    .js
  • index.android.bundle
    .js
  • index.android.bundle.meta
  • mixdrop.js
    .js
  • openload.js
    .js
  • upstream.js
    .js
  • verdana.ttf
  • videobin.js
    .js
  • vidlox.js
    .js
  • vidoza.js
    .js