General

  • Target

    a4e4989f3f9a00074c958f6820a8bca746297b61b0730ec4efcdf6fba482fe58

  • Size

    12.1MB

  • MD5

    9e12660a75098b3d1804584962cecd09

  • SHA1

    a686e91d663d1a1420fcf5df8e4ff2c665984485

  • SHA256

    a4e4989f3f9a00074c958f6820a8bca746297b61b0730ec4efcdf6fba482fe58

  • SHA512

    0b46eb680ff8b00c4d963ac30cc9d76a4172aa8fa2c6643b639c04329f9b8395526bd1646122e6de94c2245217d5d96dc928d8375de09eb933f64174c468d2bf

  • SSDEEP

    393216:7i8Bpf6efFZ0ObwZh2uuc55tuyCGsEjGRfymf:OUtHFw2uX8nt5fy+

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • a4e4989f3f9a00074c958f6820a8bca746297b61b0730ec4efcdf6fba482fe58
    .apk android arch:arm

    com.xiaozhilc.app

    com.xiaozhilc.app.ui.other.SplashActivity


Android Permissions

a4e4989f3f9a00074c958f6820a8bca746297b61b0730ec4efcdf6fba482fe58

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_LOGS