General

  • Target

    d7daadca5bf5791268070ab75d5919548ae4234adf67dc06575a868d315e9070.apk.zip

  • Size

    14.9MB

  • MD5

    fcbf69e997e3259ddff367282603ef83

  • SHA1

    1ef5f13a56d8c02a9d10aca84ca004661bcabaf5

  • SHA256

    187a10a71b2c8398d56cbc5463d654941a8eca9bdc909a2dbf15ba73c37e99f2

  • SHA512

    b1dbfb2ec59ddd5ee5727c2ad22a6d7dc90cf0076ad991e2ed4a504682db357ba76aad9cbc462c1b1fd6f93b4dce587a15a76e23b8feb703b5d283746381a2c4

  • SSDEEP

    393216:BCckzDhVhOrwF8dEydwpkz6FfGzLWg+oUtCGrliMEYAw:YzzlV0MFwZOaU0Wyol1d

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • d7daadca5bf5791268070ab75d5919548ae4234adf67dc06575a868d315e9070.apk.zip
    .zip

    Password: infected

  • d7daadca5bf5791268070ab75d5919548ae4234adf67dc06575a868d315e9070.apk
    .apk android arch:arm

    com.free.unlimited.lemon.vpn

    com.lemon.vpn.tool.SplashActivity


  • bypass-china.acl
  • bypass-lan-china.acl
  • bypass-lan.acl
  • china-list.acl
  • cid
    .elf linux x86
  • consentform.html
    .html .js
  • gfwlist.acl
  • tt_mime_type.pro
  • vcall.acl