General

  • Target

    12eb73d9c72d4b478e71c7bb29b5767b74faff28e81ec60584e0d5da65563c68

  • Size

    16.6MB

  • MD5

    619fca797e16c45e8490aef6ec9a6ca9

  • SHA1

    e3c87b61d2e64b94b608e39f83dc3c53633000a9

  • SHA256

    12eb73d9c72d4b478e71c7bb29b5767b74faff28e81ec60584e0d5da65563c68

  • SHA512

    ab8ddad1070403adb3e07de2fbb856b4037270a5b6d08e6d44cfb68c9ec6c4b2942b6b906a17507a0b4f974550b4552cf6bd6a3b9e1140b18e384f923721bcf2

  • SSDEEP

    393216:KW+o6RG8SD9UTp+4rNBzv9dvxtG5oM/+DzAyf/w8ami:kG5D9UTbvReazAAotmi

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 12eb73d9c72d4b478e71c7bb29b5767b74faff28e81ec60584e0d5da65563c68
    .apk android arch:arm

    com.ciwen.xhb.pad

    com.ciwen.xhb.ui.Welcome


  • alipay_msp.apk
    .apk android arch:arm

    com.alipay.android.app

    .activity.Cashier


  • ys-service.jar
    .apk android

Android Permissions

12eb73d9c72d4b478e71c7bb29b5767b74faff28e81ec60584e0d5da65563c68

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.READ_PHONE_STATE