General

  • Target

    af18d7530cf12082c7e32186fa5d030f21a21988955a337a4109fc95cd0ebacb.apk.zip

  • Size

    18.8MB

  • MD5

    e6d3aa6222f3fbe90708dfa700a756a0

  • SHA1

    3f8f7b001e320ed41da5808bcfa0052b772b9256

  • SHA256

    28564a48cc4bfcf5052d26bb489299d7d05f02012624d8eedabc743503ef9511

  • SHA512

    1a95e26086d5f729cbf09e06b50a1b643799d1e6a6ce36347582224922a26567ffac6231913e08d853b6a1dcf4afe12e1276306a695f4c08433281f04524497e

  • SSDEEP

    393216:l8l2AF+700POmkJ9L0BS63eWOEDCNxZc8KHNPiWCq2KAxZSqoYvS:C5FWsmYOS63eWOE468oPinqsxZuYvS

Score
7/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • af18d7530cf12082c7e32186fa5d030f21a21988955a337a4109fc95cd0ebacb.apk.zip
    .zip

    Password: infected

  • af18d7530cf12082c7e32186fa5d030f21a21988955a337a4109fc95cd0ebacb.apk
    .apk android arch:arm arch:x86

    com.busydev.audiocutter

    com.busydev.audiocutter.SplashActivity


  • Roboto-Regular.ttf
  • RobotoCondensed-Bold.ttf
  • aparat.js
    .js
  • aps-mraid.js
    .js
  • aps_mobile_client_config.json
  • cineb.js
    .js
  • clipwatch.js
    .js
  • dtb-m.js
    .js
  • index.android.bundle
    .js
  • index.android.bundle.meta
  • mixdrop.js
    .js
  • openload.js
    .js
  • upstream.js
    .js
  • verdana.ttf
  • videobin.js
    .js
  • vidlox.js
    .js
  • vidoza.js
    .js