General

  • Target

    b445d692013afc3afd1a912ec230fa87fb3474d510b2a3100f931f3be9b8444c.apk.zip

  • Size

    14.9MB

  • MD5

    310bd7173d36474baaab577eee10b6d1

  • SHA1

    a5d465c3e5fd731844f1ebc3ed00cb7630ca2780

  • SHA256

    7286a2f2bfea706cf4ca6ad84470aa023fa419cff8dc0bd21351ff78c27b809d

  • SHA512

    d42ee1da096d1029d8219a479d59f8bead7f5947c858138aa44791e3eacdb55cf349605d10909245905fe9885e5251a0660b1b08478b219fbdaaa9337d21ca8f

  • SSDEEP

    393216:24G0x4JTt8IlZSRxBtZw80z2T536aDwE/0ScvWE:W0+0oWUdu2zvb

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • b445d692013afc3afd1a912ec230fa87fb3474d510b2a3100f931f3be9b8444c.apk.zip
    .zip

    Password: infected

  • b445d692013afc3afd1a912ec230fa87fb3474d510b2a3100f931f3be9b8444c.apk
    .apk android arch:arm

    com.free.unlimited.lemon.vpn

    com.lemon.vpn.tool.SplashActivity


  • bypass-china.acl
  • bypass-lan-china.acl
  • bypass-lan.acl
  • china-list.acl
  • cid
    .elf linux x86
  • consentform.html
    .html .js
  • gfwlist.acl
  • tt_mime_type.pro
  • vcall.acl