General

  • Target

    998f20e2a635a37478bdd1ff596ada933770c9b3a3a44d189d7dfa60b9929a57

  • Size

    20.9MB

  • MD5

    49609465583640ec029f6738462d71ce

  • SHA1

    6d1ac78b0ac976322c65105ea398bd5696e42329

  • SHA256

    998f20e2a635a37478bdd1ff596ada933770c9b3a3a44d189d7dfa60b9929a57

  • SHA512

    f0f033686ddc00449c56dde00ae321c797a0d02e592fc09be9c9583aa89366aaf75f4eee804712dd17acc258feaacc4bb6765326aff2f6677d737e1387a28254

  • SSDEEP

    393216:CXo9GGx7AbE9vRIL+NergnppC4TZlh+FJhu+oqNhZFy9irf0qslM:CY9bAbRLUPRZl8Pu+oyFbrf0P6

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 4 IoCs

Files

  • 998f20e2a635a37478bdd1ff596ada933770c9b3a3a44d189d7dfa60b9929a57
    .apk android arch:arm arch:x86

    com.cyoor.idolzone

    io.dcloud.PandoraEntry


Android Permissions

998f20e2a635a37478bdd1ff596ada933770c9b3a3a44d189d7dfa60b9929a57

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.GET_TASKS

android.permission.READ_PHONE_STATE

android.permission.READ_EXTERNAL_STORAGE

android.permission.MODIFY_AUDIO_SETTINGS

com.asus.msa.SupplementaryDID.ACCESS

com.android.launcher.permission.UNINSTALL_SHORTCUT

com.huawei.android.launcher.permission.CHANGE_BADGE

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS

com.android.launcher2.permission.READ_SETTINGS

com.android.launcher3.permission.READ_SETTINGS

android.permission.REQUEST_INSTALL_PACKAGES