General

  • Target

    7f8e032dabf453960575727639d0ca1bc9ebfc9f029886f635df84ca3cdf3541

  • Size

    531KB

  • MD5

    65a34e76ad750298f7f611de9c64d5bf

  • SHA1

    a34de65f05bba9d91b723587096184b074d456f8

  • SHA256

    7f8e032dabf453960575727639d0ca1bc9ebfc9f029886f635df84ca3cdf3541

  • SHA512

    86242760273ebc198cfcb0972b2a60a05150a5e5b005b1f10443c3952d84824ff581c82f1ae8703d8571ae3561e0b2d3754730681c637d3b6215c75a5e19b689

  • SSDEEP

    12288:oUJNyyUAFVkgI7VZIPltIk4LgVzMYAnXnHRsm0jpZr:oGNJUAFV/I7VZIPltL4LgpRK3HIP

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 7f8e032dabf453960575727639d0ca1bc9ebfc9f029886f635df84ca3cdf3541
    .apk android

    role.getcut.screencutgo

    au.akcp.Jwap


Android Permissions

7f8e032dabf453960575727639d0ca1bc9ebfc9f029886f635df84ca3cdf3541

Permissions

com.android.launcher.permission.INSTALL_SHORTCUT

android.permission.READ_PHONE_STATE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.GET_TASKS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE