General

  • Target

    849c337133502d83dc9967bd8612317a02fccbe179f18c9454ade1e151680cc2

  • Size

    18.7MB

  • MD5

    76d2f66e3d6614ba8d528283de92a0f1

  • SHA1

    11e1ff42212896ced8679fb1ec47eda8bb067786

  • SHA256

    849c337133502d83dc9967bd8612317a02fccbe179f18c9454ade1e151680cc2

  • SHA512

    1c134e89b11a001f7631d22224d7d164054662ef63c407e18430820dc58fe053974d0e923b31bb6218d131fc01cf7f87c6c979ac9f7a4e5446d5d9fa69213ee7

  • SSDEEP

    393216:vlsoPdfKHnW1vwnGURiYwUxiXxO8S7Z0/O2J7UPKuIjMs:vls/HMvwGZYwmAO8aZ0d4PXIAs

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 849c337133502d83dc9967bd8612317a02fccbe179f18c9454ade1e151680cc2
    .apk android arch:arm

    com.veewo.darkslash2

    com.veewo.darkslash2.AppActivity


  • gdtad.jar
    .apk android

Android Permissions

849c337133502d83dc9967bd8612317a02fccbe179f18c9454ade1e151680cc2

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.WRITE_EXTERNAL_STORAGE

com.android.vending.BILLING

android.permission.GET_TASKS

android.permission.READ_PHONE_STATE