General

  • Target

    9d9a028e8975f9fdebc31e5459d35760f9efa38cabb90c4b3c9617c78de1478a

  • Size

    1.1MB

  • MD5

    fa5d847d9f3925e40f33f28c88f91440

  • SHA1

    ceecfaaf544f2dd64233e4bce578f54d2bc63331

  • SHA256

    9d9a028e8975f9fdebc31e5459d35760f9efa38cabb90c4b3c9617c78de1478a

  • SHA512

    edf1f102c1b4ef82a6adba7813cffc3967fea052d0b27392536a7517d0a7c819d3c3e7841777be3e45a59f43c0ecc0a7b59cf11431821e291238f95583eb544f

  • SSDEEP

    24576:b5Fs1+Y1LkGxxAgkiSrBNzSW5WNSnaHp+wkPGDSL6P8DR:b5Fs111Lke5kg2WzH31DC62

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 4 IoCs

Files

  • 9d9a028e8975f9fdebc31e5459d35760f9efa38cabb90c4b3c9617c78de1478a
    .apk android arch:arm

    com.ft.chifaner.dealer

    com.ft.chifaner.dealer.ui.SplashActivity


Android Permissions

9d9a028e8975f9fdebc31e5459d35760f9efa38cabb90c4b3c9617c78de1478a

Permissions

android.permission.CALL_PHONE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.READ_PHONE_STATE