General

  • Target

    6f5b1c89e5c16a350986a8b1de9c99f360b4e6b11f92f7999c0fa62134585251

  • Size

    15.8MB

  • MD5

    f7bddae6076d418035ce4895bc88dac9

  • SHA1

    f2509e25b86fd7c11a19be9128f1a9ab0f7a5308

  • SHA256

    6f5b1c89e5c16a350986a8b1de9c99f360b4e6b11f92f7999c0fa62134585251

  • SHA512

    cb8f6107a458306c38e35e7faed51c26ffb331996325576fd63b83b23b6d4073bdec0ae329866b7c4d04b6f2ddaf49c70fd67191b5d8f2ee2fab736ba5aa4492

  • SSDEEP

    196608:2rAs5/4wo3xYhM5rBAZUYJca2FxZTrKRkiRivSnbLBq8hOzxEQ13Zkg4FJpiP8Bq:Sv5/4wo3xYGTfBFzTreRiMAjpkZJKRN

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 6f5b1c89e5c16a350986a8b1de9c99f360b4e6b11f92f7999c0fa62134585251
    .apk android arch:arm arch:x86

    com.planeth.pvaiugstomper

    com.qihoo.util.StartActivity


Android Permissions

6f5b1c89e5c16a350986a8b1de9c99f360b4e6b11f92f7999c0fa62134585251

Permissions

android.permission.SYSTEM_ALERT_WINDOW

android.permission.WRITE_EXTERNAL_STORAGE

com.android.vending.CHECK_LICENSE

android.permission.READ_PHONE_STATE