Errors

Reason
unexpected chunk type

General

  • Target

    000a6b8f2683f3525d2013463b9f759f5a0bceba2152b2df7b0b9d1f001d379d.apk.zip

  • Size

    61.3MB

  • MD5

    295ccc123979b195985f6926f1eab15d

  • SHA1

    fad1d4657e7bb7a1baa4ec8ba3093fce40c0e38b

  • SHA256

    4457ee81a01234aaca337245d84e0b542f4a6ecc5e6580c1a84720561730f2e5

  • SHA512

    1094095b7b65f8e5b9c5c9db5e402410e3828d397eb7d0bf09e038f4e26613b00a8507006662ce8d794373c6bf23c4f11c9e7651d1a2bc48b69762ece019b26b

  • SSDEEP

    1572864:TAE2C9W/kACpFxyRMZiCb28BSJuzj8snn2fIG5:TAIW8JFwK1b2Kpjxn2fP

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 10 IoCs

Files

  • 000a6b8f2683f3525d2013463b9f759f5a0bceba2152b2df7b0b9d1f001d379d.apk.zip
    .zip

    Password: infected

  • 000a6b8f2683f3525d2013463b9f759f5a0bceba2152b2df7b0b9d1f001d379d.apk
    .apk android arch:arm

    com.youku.phone

    com.youku.phone.ActivityWelcome


  • 0.bin
  • 0.sql
  • ProvisionDialog.html
    .html
  • backup.json
  • bundleInfo-7.3.7.json
  • channel_entry_translate.json
  • channel_entry_translate_revert.json
  • com.alibaba.weex.plugin.gcanvas.1a9a0e42.json
  • com.alibaba.weex.plugin.gcanvas.bubble.weex.bf4b2326.json
  • data.json
  • faxian.json
  • home.json
  • hotspot.json
  • huiyuan.json
  • img_0.png
    .png
  • img_1.png
    .png
  • img_2.png
    .png
  • loading_sphere.json
  • main.js
    .js
  • planet.json
  • rax.js
    .js
  • shouye.json
  • uniquemods.js
    .js
  • user.json
  • vip.json
  • weex_config_bindingx.json
  • wode.json
  • xingqiu.json
  • ykf_iconfont.ttf