General

  • Target

    e75a5555df617bf4e4276d04284c3f91d0ada018ad842101a9c527c857b94e9a.apk.zip

  • Size

    17.2MB

  • MD5

    dfacc65a07bbb835f7a90ef086e0e31f

  • SHA1

    d71d87ad5d4ca8021687fc6d00545dcd5a44ef42

  • SHA256

    29780db3c4512bdddefff926eb54ffc5d4acebd68a3c9bee19272fc2b0a5e01f

  • SHA512

    902165fb9148b6400aecd30d8f4aacf303f87cd1ec4f14560fe5c8a7c23c87144fa9c27ee897a19065f3a86e422453a32740476e7ef09dc2ab4d747634ee1896

  • SSDEEP

    393216:8Q2Vu8lcdlXE12TPcxaXu9WLny5DR8/JJ/i8gjvkKlvwCozuKR:8hVu8lgGYTEkXu4ARsJ/LgQKBDozuC

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • e75a5555df617bf4e4276d04284c3f91d0ada018ad842101a9c527c857b94e9a.apk.zip
    .zip

    Password: infected

  • e75a5555df617bf4e4276d04284c3f91d0ada018ad842101a9c527c857b94e9a.apk
    .apk android arch:arm arch:x86

    com.busydev.audiocutter

    com.busydev.audiocutter.SplashActivity


  • Roboto-Regular.ttf
  • RobotoCondensed-Bold.ttf
  • aparat.js
    .js
  • aps-mraid.js
    .js
  • aps_mobile_client_config.json
  • cineb.js
    .js
  • clipwatch.js
    .js
  • dtb-m.js
    .js
  • index.android.bundle
    .js
  • index.android.bundle.meta
  • mixdrop.js
    .js
  • openload.js
    .js
  • upstream.js
    .js
  • verdana.ttf
  • videobin.js
    .js
  • vidlox.js
    .js
  • vidoza.js
    .js