General

  • Target

    464729b34937dff9961d589485602d7d2aacf7f86a267424212f0f4d9f2c156a.apk.zip

  • Size

    17.5MB

  • MD5

    010fb4a93cb88f58fed5e963c5fc5d7d

  • SHA1

    b8710f7e7aba932d4ccf531f5733e15c644d6dae

  • SHA256

    54856ecf34dd9655a4c6aa248048de093dec70746419ea0688a5766894d17ca3

  • SHA512

    8a7c0caae17aff12c93c45299138040375962d191669b225efef0bf6bd262c69c44e00d71b0fa467828b9d0c1724a7c1c0819736333e3c2a607ce185d42ebb58

  • SSDEEP

    393216:nQ6HyOSgM7UJy7pJHQAXH9L5q+RBAR0pZN9EZZAVxyAOmqtw:n+3NSyj1XdL5b3piZ+V4AOdG

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • 464729b34937dff9961d589485602d7d2aacf7f86a267424212f0f4d9f2c156a.apk.zip
    .zip

    Password: infected

  • 464729b34937dff9961d589485602d7d2aacf7f86a267424212f0f4d9f2c156a.apk
    .apk android arch:arm64 arch:arm arch:mips arch:mips64 arch:x86 arch:x64

    clickpaypro.appup

    clickpaypro.appup.preinicio


  • CaviarDreams.ttf
  • Pacifico.ttf
  • Sansation-Regular.ttf
  • Walkway_Bold.ttf
  • audience_network.dex
    .dex
  • baseline.prof
  • crear_transaction.html
    .html .js
  • sound2.wav
  • sound3.wav
  • sound4.wav
  • sound5.wav
  • sound_out2.wav
  • sound_out3.wav
  • sound_out4.wav
  • sound_out5.wav