General

  • Target

    6d5ff041b3a7ac6fa3138eb1ec6f8da301eb99e1a6c19483c3e4e7cc536f3267

  • Size

    16.2MB

  • MD5

    027655ca529d377f61dd60535c9c7e69

  • SHA1

    f7bcdce724ba214d52f761eec7f9ba7371ceda4b

  • SHA256

    6d5ff041b3a7ac6fa3138eb1ec6f8da301eb99e1a6c19483c3e4e7cc536f3267

  • SHA512

    a57a35dd5e63d95b8480f270dabee3e430c389a683908b593887c6ece09f81a5116e7e32a785c57acc854f1a7c7549e185abfbf435858217041aec91db6efe92

  • SSDEEP

    393216:gAMc7JuZtO4Qcutyk+sQIDlilzVdP7y2wL4eU2LMSGOcTR2vPT:gLvtO4QcutyyQJXk0jcggvr

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 6d5ff041b3a7ac6fa3138eb1ec6f8da301eb99e1a6c19483c3e4e7cc536f3267
    .apk android arch:arm64 arch:arm arch:x86 arch:x64

    com.coupon.tjknoe

    com.coupon.tjknoe.main.activity.SplashActivity


Android Permissions

6d5ff041b3a7ac6fa3138eb1ec6f8da301eb99e1a6c19483c3e4e7cc536f3267

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE