General

  • Target

    1cd7e014877fa12bac3402962377a50f41cc6f69018653143c26a1af2c66587b

  • Size

    9.9MB

  • MD5

    5a70030958c0def6ab4f000e506880b1

  • SHA1

    ccbe9a39856cf5b870133dbe58ce7e777060ca01

  • SHA256

    1cd7e014877fa12bac3402962377a50f41cc6f69018653143c26a1af2c66587b

  • SHA512

    ca5f098ac9b8d91ffe41345f7cb9846ad18b0e956bd26f21bb6036be74dee39ef91fa54a88f224af3a2233da260deb03dafbff0448330a5504ee4acd2cdbf437

  • SSDEEP

    196608:qOjssaHanwx6qhbHZXRgAuS2qNl7UPIZhK3IFCl4FrjxVfLM7mEeH+PEyfs:qOjssBYb5X3Bl7UQ4IFCaZHfgcUs

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 6 IoCs

Files

  • 1cd7e014877fa12bac3402962377a50f41cc6f69018653143c26a1af2c66587b
    .apk android arch:arm

    com.qtrun.QuickTest

    com.qtrun.QuickTest.LauncherActivity


  • telephony.jar
    .apk android

Android Permissions

1cd7e014877fa12bac3402962377a50f41cc6f69018653143c26a1af2c66587b

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE

com.android.vending.BILLING

android.permission.READ_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE