General

  • Target

    4cb902c3639384c6d8770a633f3920f42f150ec43fc1c62d3b40ba1aafeced64.apk.zip

  • Size

    126.9MB

  • MD5

    07881013ea29008843ae44d17e4d621d

  • SHA1

    ee0e2f6d51a7f0529cdf799b526c195238872b9a

  • SHA256

    8559011363a311d8688df5e8f4b8e69dc2d5a2dea485ca7e90410b725df2755b

  • SHA512

    c41f98ff98376b9ad0cf3977158710002d6b05d620e0ea7f92bf5d0a7781d8e2d29a95a2765b60615e63bef59ab200e76e817a60a9527cb6f4b6bd9134ef49a2

  • SSDEEP

    3145728:rWzLj53mKMH6gluf8gWkU5M9S4i0mLYG6gBGU:q/Zm2HUzkd1r7lgh

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 11 IoCs

Files

  • 4cb902c3639384c6d8770a633f3920f42f150ec43fc1c62d3b40ba1aafeced64.apk.zip
    .zip

    Password: infected

  • 4cb902c3639384c6d8770a633f3920f42f150ec43fc1c62d3b40ba1aafeced64.apk
    .apk android arch:arm64 arch:arm arch:x64 arch:x86

    com.dwsh.orgovik

    com.dwsh.orgovik.features.auth.LoginActivity


  • bc_s.png
    .png
  • bdwn.png
    .png
  • closed.png
    .png
  • cpim_grammar
  • doc.png
    .png
  • dont_wait_too_long.mkv
  • doxygen.png
    .png
  • folderclosed.png
    .png
  • folderopen.png
    .png
  • four_hands_together.mkv
  • hello16000.wav
  • hello8000.wav
  • house_keeping.mkv
  • identity_grammar
  • incoming_chat.wav
  • its_a_game.mkv
  • leaving_dreams.mkv
  • nav_f.png
    .png
  • nav_g.png
    .png
  • nav_h.png
    .png
  • notes_of_the_optimistic.mkv
  • nowebcamcif.jpg
    .jpg
  • oldphone-mono.wav
  • open.png
    .png
  • ringback.wav
  • rootca.pem
  • silence.mkv
  • soft_as_snow.mkv
  • splitbar.png
    .png
  • structismapcontainer.png
    .png
  • structprivate_1_1ismapcontainerimpl.png
    .png
  • structprivate_1_1ismapcontainerimpl_3_01t_00_01void__t_3_01typename_01t_1_1key__type_00_01typena75682bb14a0833e99fd03a070051a2d9.png
    .png
  • sync_off.png
    .png
  • sync_on.png
    .png
  • tab_a.png
    .png
  • tab_b.png
    .png
  • tab_h.png
    .png
  • tab_s.png
    .png
  • toy-mono.wav
  • vcard_grammar