General

  • Target

    eb133114fddd85d1bb3ef6b36b8a0cca52b4c16548c14ddf9b102eff6cc162a7.apk.zip

  • Size

    14.9MB

  • MD5

    71456bc9a229057ae10a7e6dce3536e2

  • SHA1

    1e280b8e6afd15caf9ec7e8f70f0291e65ab26e2

  • SHA256

    185e4cf5bd581d0cbad8de054ca34dd7c0f8fe43d57e0229782e99a2b6118e78

  • SHA512

    a9f2840d7e7ca6e56cd884e63b79ff9c82d5e31aacf8e74029a877e90fdf2362dab132dbdd6bfb1015e33d8c99435036120554c6943efe35654bb6672832a669

  • SSDEEP

    393216:PjLVQtzlQkKuohIglY1WL3Wv/wM9ZNG6K2YKc:PjLVQtzlpKNbOAL32l9ZNG6c

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • eb133114fddd85d1bb3ef6b36b8a0cca52b4c16548c14ddf9b102eff6cc162a7.apk.zip
    .zip

    Password: infected

  • eb133114fddd85d1bb3ef6b36b8a0cca52b4c16548c14ddf9b102eff6cc162a7.apk
    .apk android arch:arm

    com.free.unlimited.lemon.vpn

    com.lemon.vpn.tool.SplashActivity


  • bypass-china.acl
  • bypass-lan-china.acl
  • bypass-lan.acl
  • china-list.acl
  • cid
    .elf linux x86
  • consentform.html
    .html .js
  • gfwlist.acl
  • tt_mime_type.pro
  • vcall.acl