General

  • Target

    15a12625f085a7dd4c432c333c4d7a3326caf6bbb002a6960b6064534f8b0443

  • Size

    4.6MB

  • MD5

    15a5c9d84d37dfd965eb14e4118f179a

  • SHA1

    e604d41decf951d070d9e68e4ded3b43f51326e0

  • SHA256

    15a12625f085a7dd4c432c333c4d7a3326caf6bbb002a6960b6064534f8b0443

  • SHA512

    bdaa440344201bdda950691c0ca829a11065bf5643f96613155c7ebe602f0647ba92cd72dff81aeb72a24ab97eb9bf4dad28521733badc5caf305800728b0c20

  • SSDEEP

    98304:jhE4cInvyfAGzZAvrC9ne+knmCLuWtI+x9E9GIo/PmCNo:jm8nvcNQrKnGnU+35IovNo

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 7 IoCs

Files

  • 15a12625f085a7dd4c432c333c4d7a3326caf6bbb002a6960b6064534f8b0443
    .apk android arch:arm arch:mips arch:x86

    com.vcread.android.phone.jzsfyjphone

    .StartActivity


  • UPPayPlugin.apk
    .apk android arch:arm

    com.unionpay.uppay

    com.unionpay.uppay.PayActivity


  • alipay_plugin_20120428msp.apk
    .apk android

    com.alipay.android.app

    .Cashier


Android Permissions

15a12625f085a7dd4c432c333c4d7a3326caf6bbb002a6960b6064534f8b0443

Permissions

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.INTERNET

android.permission.ACCES_MOCK_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.KILL_BACKGROUND_PROCESSES

com.android.vending.BILLING

android.permission.CALL_PHONE

android.permission.SEND_SMS

android.permission.CAMERA

android.permission.WRITE_SETTINGS

android.permission.GET_TASKS

android.permission.CHANGE_WIFI_STATE