General

  • Target

    b3fe264ab5bff031bbdac788faf9f24c

  • Size

    4.5MB

  • MD5

    b3fe264ab5bff031bbdac788faf9f24c

  • SHA1

    25a8dc19251be267d009b7f64a398ae35a9ae148

  • SHA256

    47f2f779afd942c9280d789a5f7ded37bd2f67b9aef91aad047b5fd6601859a0

  • SHA512

    84278de073fb071588348b08039c7b6d8692de68d59b042e406110a56f0463bb746b7700c51ffda6b52b3268cb250c8b76667accb93318394d44dee201c62053

  • SSDEEP

    98304:rP7xZWmCnS08OLsKzINbaffvEEIX6DbRYTsGR/57QqIZWl:rP7fWzS080XzYSfccR0sw7QFU

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • b3fe264ab5bff031bbdac788faf9f24c
    .zip
  • dz_tools/PC10IMG.zip
    .zip
  • android-info.txt
  • recovery.img
  • dz_tools/com.modaco.visionaryplus.r14.apk
    .apk android arch:arm

    com.modaco.visionaryplus

    .preferences


  • Superuser.apk
    .apk android

    com.noshufou.android.su

    Su


  • dz_tools/gfree
    .elf linux arm
  • dz_tools/gfree_verify
    .elf linux arm