General

  • Target

    708c9f4bfd823333cbac835f452fc8759f5b6aaea62e55e8c51d12594cb9fa57

  • Size

    6.5MB

  • MD5

    99314529a7a60b3b8056ff6bc1508fb9

  • SHA1

    519ab2c5f7e2acc819795cdbf2759086b8f391dd

  • SHA256

    708c9f4bfd823333cbac835f452fc8759f5b6aaea62e55e8c51d12594cb9fa57

  • SHA512

    18493ed40efaac77658a97b5cd03d188c8dfa655eee45573422901b9cf8815ed4b7a281831047c6746e12503d0939261514aa322a60ec2f4442dc3a862f3c402

  • SSDEEP

    196608:PjctrsyeEGWUy4nPs6PkNkudSzdeUlYu4XR:bSrveE1AnPs89YSzfYLB

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 8 IoCs

Files

  • 708c9f4bfd823333cbac835f452fc8759f5b6aaea62e55e8c51d12594cb9fa57
    .apk android arch:arm arch:mips arch:x86

    com.vcread.android.screen.pad.slshjqk

    com.qihoo.util.StartActivity


  • alipay_plugin_20120428msp.apk
    .apk android

    com.alipay.android.app

    .Cashier


Android Permissions

708c9f4bfd823333cbac835f452fc8759f5b6aaea62e55e8c51d12594cb9fa57

Permissions

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCES_MOCK_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.KILL_BACKGROUND_PROCESSES

com.android.vending.BILLING

android.permission.CALL_PHONE

android.permission.SEND_SMS

android.permission.CAMERA

android.permission.WRITE_SETTINGS

android.permission.GET_TASKS

android.permission.CHANGE_WIFI_STATE