General

  • Target

    a09b42341a0399b0301bc5ce550ae2dc7ccdca84a9027d7e1f0b547bee8b0ab7

  • Size

    4.5MB

  • MD5

    032788f8ce132f2094799d6838141915

  • SHA1

    6c70a87d4c66e28b4f18a694e760e25091be7bec

  • SHA256

    a09b42341a0399b0301bc5ce550ae2dc7ccdca84a9027d7e1f0b547bee8b0ab7

  • SHA512

    42a1ed53e15eaa38172f8bb5855234be465750a2ae483119d5fc6c5147e3dd1325e443c3a975e9ea6d69ee3280b9c273a95c38449d50f4d5f8c1c31fd2a89b2e

  • SSDEEP

    98304:MWFgn0GGR63UOBE2fNHqXLLjGDBWH4MpF+gpnYo1xuA+pommQsm4t82G5WM50Azm:VF0hKK1WrpQDKTQshI30AK

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs

Files

  • a09b42341a0399b0301bc5ce550ae2dc7ccdca84a9027d7e1f0b547bee8b0ab7
    .apk android arch:arm arch:x86

    com.teragon.nightsky.pro

    com.teragon.nightsky.pro.ProWelcomeActivity


Android Permissions

a09b42341a0399b0301bc5ce550ae2dc7ccdca84a9027d7e1f0b547bee8b0ab7