General

  • Target

    aa4c304b507ed358238e8f48fb954d4c0d4caba40a42c0d6ee4a9c41e5417007

  • Size

    3.4MB

  • MD5

    275a173f476d05aad1115f8f42a4ae6c

  • SHA1

    378ad5f45b6851dc433f7e7ab1a4f8eedfeafac3

  • SHA256

    aa4c304b507ed358238e8f48fb954d4c0d4caba40a42c0d6ee4a9c41e5417007

  • SHA512

    f013138e5ea1436de0310f10644966dde41c4f2f1a64b708b40c6adaabe494dd24e1b021e70a42b204bd8aafa8c848fdd28d305f6d364dd9969b5fce8dd32b3f

  • SSDEEP

    98304:9alHfWA3ys/KQEdpIA2eZrVXC4nEPGWbVw7Uo1nfV:98eA3y6RETjZrVXC4nEOWbQnfV

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • aa4c304b507ed358238e8f48fb954d4c0d4caba40a42c0d6ee4a9c41e5417007
    .apk android arch:arm

    com.mengtaowangluo

    com.mengtaowangluo.ui.SplashActivity


Android Permissions

aa4c304b507ed358238e8f48fb954d4c0d4caba40a42c0d6ee4a9c41e5417007

Permissions

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.RESTART_PACKAGES

android.permission.GET_TASKS

android.permission.WRITE_EXTERNAL_STORAGE