General

  • Target

    00a3ced578dfdb5a06300a9f2249380f079eb9c576a65d6a3ce9c9457096d4aa

  • Size

    28.6MB

  • MD5

    3c3da8c26beacef9017ed51d32e96879

  • SHA1

    73027e28b706f85cacdcd6f3c6d01c918319c2c5

  • SHA256

    00a3ced578dfdb5a06300a9f2249380f079eb9c576a65d6a3ce9c9457096d4aa

  • SHA512

    b2f06fbb3572ff359d4a75aa252793edc1d630933de7a07aca76a9701a2cbfeb7177253b48a30a2272c2fe3fe2e751838193de78eaa8ad3b6ca7f60d221e8ccb

  • SSDEEP

    786432:x82XCK8IeEkDSXgvMiH77zDsPcxM3FgBcCg:xJV3tkuQvt/HsPc3B7g

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • 00a3ced578dfdb5a06300a9f2249380f079eb9c576a65d6a3ce9c9457096d4aa
    .apk android arch:x86 arch:arm

    com.hulk.example.jinshaylc

    yiqicai.example.webdgo.DownloadActivity


Android Permissions

00a3ced578dfdb5a06300a9f2249380f079eb9c576a65d6a3ce9c9457096d4aa

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE