General

  • Target

    16a6447fff2089a55abf15f2d866c5878dee8f7e4ac0911f5ecd2511e4b9c5b2

  • Size

    4.6MB

  • MD5

    62bb279a12025101e48dd83d995d09c6

  • SHA1

    74af7e7f03ea770a08ad8b12113586ebc42633b7

  • SHA256

    16a6447fff2089a55abf15f2d866c5878dee8f7e4ac0911f5ecd2511e4b9c5b2

  • SHA512

    df5d67e72582bab4cd450aff5c56296e5e5e9b7292011a6488de3a6633f7e56b32acf6ab541d03944caa51cd8e2f3e87ed5322fe71382d88c40a5e3431bb8078

  • SSDEEP

    98304:09lfAGzrdI4r0a0fB1Kl8XhWYovu+aftR78zbRnPFgep:09v3i4ArfPyStdOdnPV

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 8 IoCs

Files

  • 16a6447fff2089a55abf15f2d866c5878dee8f7e4ac0911f5ecd2511e4b9c5b2
    .apk android arch:arm arch:mips arch:x86

    com.vcread.android.pad.sjywb

    .IndependentPadActivity


  • alipay_plugin_20120428msp.apk
    .apk android

    com.alipay.android.app

    .Cashier


Android Permissions

16a6447fff2089a55abf15f2d866c5878dee8f7e4ac0911f5ecd2511e4b9c5b2

Permissions

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCES_MOCK_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.KILL_BACKGROUND_PROCESSES

com.android.vending.BILLING

android.permission.CALL_PHONE

android.permission.SEND_SMS

android.permission.CAMERA

android.permission.WRITE_SETTINGS

android.permission.GET_TASKS

android.permission.CHANGE_WIFI_STATE