General

  • Target

    757d664a07a01a9709a18e3051135c1202f9211e00c6ee59c723d29de49687e8

  • Size

    4.6MB

  • MD5

    b9e0492891814ae18b636fb7a06e974a

  • SHA1

    1ac64b021df36179a0461ce1bf2ca66c08700f1f

  • SHA256

    757d664a07a01a9709a18e3051135c1202f9211e00c6ee59c723d29de49687e8

  • SHA512

    3e1515a4ff36bfea83015a7216a3ef5a9f9c514afa1d5a4b331a11da4bf49e8629037811bff2c976d657a9693c6654e90b40ce3b806b0f7923b081a35179f4fe

  • SSDEEP

    98304:pEEDSqoZXyAStzAe/WP1zQoFmC37+oC3+yts9WEO1B9L0dVf/UREr2MZtx4:pEChqyAStEe+P9j3C1exO1B9Sxrfx4

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 8 IoCs

Files

  • 757d664a07a01a9709a18e3051135c1202f9211e00c6ee59c723d29de49687e8
    .apk android

    com.xx.np

    com.pubg.voice.activity.InitActivity


  • gdtadv2.jar
    .apk android

Android Permissions

757d664a07a01a9709a18e3051135c1202f9211e00c6ee59c723d29de49687e8

Permissions

com.android.launcher.permission.INSTALL_SHORTCUT

android.permission.INTERNET

android.permission.SYSTEM_ALERT_WINDOW

android.permission.SYSTEM_OVERLAY_WINDOW

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.MEDIA_MOUNTED

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_PHONE_STATE

android.permission.CALL_PHONE

android.permission.MODIFY_AUDIO_SETTINGS