General

  • Target

    7ee03b8650a4d88ce4adb08b217a10cc1bd39cd6af982c4d19fa37ff7c3b0c64

  • Size

    20.7MB

  • MD5

    4f53c1cbc0540c397e25285a54778056

  • SHA1

    c9b51719b6d34c51d0708e6ed100a519677e6cb4

  • SHA256

    7ee03b8650a4d88ce4adb08b217a10cc1bd39cd6af982c4d19fa37ff7c3b0c64

  • SHA512

    320871e1723c98512dad1777b632c288c559df487b640b62fe93e1b1a296e37f6b78a7146dc4ef65dbb4b062b451127ac83656dde46a025cd32a1bb70c998f8a

  • SSDEEP

    393216:Ip2qIRi/cCLfDUvryu8L3phKkrEc+IHT6dIx4DoB9z83o/E8Mr+pUmf/quKdJ3LQ:Ip2Ti/2ryu8L3pZztG38B9z84PpUTNJ0

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 10 IoCs

Files

  • 7ee03b8650a4d88ce4adb08b217a10cc1bd39cd6af982c4d19fa37ff7c3b0c64
    .apk android arch:arm

    com.junhai.qmdzf.cgamex

    prj.chameleon.channelapi.SplashScreenActivity


Android Permissions

7ee03b8650a4d88ce4adb08b217a10cc1bd39cd6af982c4d19fa37ff7c3b0c64

Permissions

android.permission.INTERNET

android.permission.CHANGE_NETWORK_STATE

android.permission.CHANGE_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_PHONE_STATE

android.permission.READ_EXTERNAL_STORAGE

android.permission.CALL_PHONE

android.permission.ACCESS_COARSE_LOCATION

android.permission.RECORD_AUDIO

android.permission.CAMERA

android.hardware.camera.autofocus

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.RECORD_VIDEO

android.permission.VIBRATE

android.permission.FLASHLIGHT

cn.swiftpass.wxpay.permission.MMOAUTH_CALLBACK

cn.swiftpass.wxpay.permission.MM_MESSAGE

xvtian.gai.receiver

android.permission.SYSTEM_ALERT_WINDOW

android.permission.SYSTEM_OVERLAY_WINDOW

android.permission.GET_TASKS