General

  • Target

    7dfe1e413802cf07a30fa0e369f47eaf7eb7261d09b1bb1701f0a0ba90c043eb

  • Size

    11.4MB

  • MD5

    610b7f4746e813ea877a68fddb868f24

  • SHA1

    08d476c8ae64d355e1f3dbb1719d7ab41e0823d8

  • SHA256

    7dfe1e413802cf07a30fa0e369f47eaf7eb7261d09b1bb1701f0a0ba90c043eb

  • SHA512

    d4b2d5b403ff42a5182a1494376cf7ec6beb29fa0166cdd34d0a486e868937c76440c77eba5c03c66001a612efcbbb25378f3737da72610326f9aeb3bfaf0d97

  • SSDEEP

    196608:u6nEYi8UTzVfGf88Gs5qSiGb92xHp0+SRi2+oVUdzVS4zceJ6RyF1eIs4/0FxA4z:T3VBDR5qWIXQRi8YzRJoA1eL4/0FPRB

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 7dfe1e413802cf07a30fa0e369f47eaf7eb7261d09b1bb1701f0a0ba90c043eb
    .apk android

    info.bmstore.rlzygls2

    info.bmstore.rlzygls2.activity.WelcomeActivity


Android Permissions

7dfe1e413802cf07a30fa0e369f47eaf7eb7261d09b1bb1701f0a0ba90c043eb

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.READ_EXTERNAL_STORAGE