General

  • Target

    4c0be5b2bd8d0de312026b4726eedd896f95cb8b4e965cb9e89a1a958fca5887

  • Size

    4.0MB

  • MD5

    d2dd06eb5dae731b9765e067d70e314d

  • SHA1

    3e2d52c67ec429a6142d66942b9d0b42f118190f

  • SHA256

    4c0be5b2bd8d0de312026b4726eedd896f95cb8b4e965cb9e89a1a958fca5887

  • SHA512

    dab38e867e53b2329e4b488e0ded214e076948cb07698bf54ebe6e4822d0211c3a75e205daa4fe06370aa0778ba84f50c93d01e26457a56f3248768d3bf74947

  • SSDEEP

    98304:Fip9EMOu5IwNQRgzefWqOWRK1PPNR5lcP2vx4/ytuaJE:wp9EXu5xZWWJPPwyxSyYaS

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 4c0be5b2bd8d0de312026b4726eedd896f95cb8b4e965cb9e89a1a958fca5887
    .apk android arch:arm64 arch:arm arch:mips arch:mips64 arch:x86 arch:x64

    com.maizhi.cordova_app

    com.maizhi.cordova_app.MainActivity


Android Permissions

4c0be5b2bd8d0de312026b4726eedd896f95cb8b4e965cb9e89a1a958fca5887

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE