General

  • Target

    a09765a3834f4e141a43b1329a14e13e231c6cd145523e71c444ae7364e82e92

  • Size

    1.9MB

  • MD5

    ad88e4e81b2583a8a5a45e237ea1078b

  • SHA1

    0c59be204aee03add82413bc0085f96ad0657b45

  • SHA256

    a09765a3834f4e141a43b1329a14e13e231c6cd145523e71c444ae7364e82e92

  • SHA512

    d4a27ca463a353247afccba9a15fd6ba6e5ca159b45dc44979bf2b5bc48abd6a89da2437e79343dc917348310d4dfaad0c46cf3300fc2d1ffcd47eacd5d9ebae

  • SSDEEP

    49152:gVbiZ/sd57ekqQN/Nim+odFrevwEQMzJ/stzS7gWG:gV+dK9N/Rre49l

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • a09765a3834f4e141a43b1329a14e13e231c6cd145523e71c444ae7364e82e92
    .apk android arch:arm

    com.qq.reader

    .SplashActivity


Android Permissions

a09765a3834f4e141a43b1329a14e13e231c6cd145523e71c444ae7364e82e92

Permissions

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE

android.permission.RESTART_PACKAGES

android.permission.VIBRATE

android.permission.WAKE_LOCK

android.permission.CHANGE_CONFIGURATION