General

  • Target

    b5b799fa31b5d3529aee432ac5403081d055f8069f1c50ffd6e3bca8df2283ce

  • Size

    17.3MB

  • MD5

    573420328fa99bf69fddb6dbb420e336

  • SHA1

    b2cc32fcaddd28b52c51da959c2fe9e5339c18e2

  • SHA256

    b5b799fa31b5d3529aee432ac5403081d055f8069f1c50ffd6e3bca8df2283ce

  • SHA512

    ad5e48e617af1f670bf09b834431bbb1191374c14f34f57340e58cd3e314571dcb8b7007317d1629537cb3530894da9304b14c8d07ecd5fa272b404f4715f5c0

  • SSDEEP

    393216:R1RiqSTU5r9OXbW2w9grUx64W4mtwLBCHd7Z27p6W/f:/5r4L/w9hxO4Di7ZbW/f

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • b5b799fa31b5d3529aee432ac5403081d055f8069f1c50ffd6e3bca8df2283ce
    .apk android

    yuriko_no_Bonyu.aptoide_JyagamiPanty

    yuriko_no_Bonyu.aptoide_JyagamiPanty.MainActivity


Android Permissions

b5b799fa31b5d3529aee432ac5403081d055f8069f1c50ffd6e3bca8df2283ce

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.GET_ACCOUNTS

android.permission.USE_CREDENTIALS