General

  • Target

    295e6c31e2f2b88a4ee5fe2e7b86f0bcc3a271f7c52eb4bf649d3df057f9196f.apk.zip

  • Size

    19.1MB

  • MD5

    294dd153767e331e89af2411679d04f4

  • SHA1

    0036f6a133aebbd661bb05ace5229cd946f6b3af

  • SHA256

    3a20d48d55b40ec9f968a664d540cc3155e1c3e92561879efe31f9e5e970f926

  • SHA512

    2dc44a4fb6e74429a58fc1d76c5971fb6a071d54b00efd974d258a4fec7d8113bfff336f9cb8cd4f58928d8c94df18f0115f1ed7a5297aad6d64b457266f2db3

  • SSDEEP

    393216:C/s0CdTm3ob2cJM8YMnstaUgB6qHSmRyGDVSGRKZVTIuFnq:JAobesPhhzVjRYhIus

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 295e6c31e2f2b88a4ee5fe2e7b86f0bcc3a271f7c52eb4bf649d3df057f9196f.apk.zip
    .zip

    Password: infected

  • 295e6c31e2f2b88a4ee5fe2e7b86f0bcc3a271f7c52eb4bf649d3df057f9196f.apk
    .apk android arch:x86 arch:arm arch:x64 arch:arm64

    com.fortinet.forticlient_fa

    forticlient.start.bringtofront.BringToFrontStartActivity


  • _
    .gz
  • _
    .tar
  • _/ftnt.ks
  • cacert.pem
  • config
  • dhcd-hooks/20-dns.conf
    .sh linux
  • dhcd-hooks/95-configured
    .sh linux
  • dhcd-run-hooks
    .sh linux
  • dhcd.conf
  • fortisslcacert.pem
  • fortisslclient.crt
  • fortisslclient.key
  • ip-up
    .sh linux
  • server.crt
  • server.key