General

  • Target

    b6d92b7f9373ac453524e3b05edd5f1bfeba12b2ee49dd0aee7c6cf03f618dcd

  • Size

    6.0MB

  • MD5

    251dae8ea7c5ca435345eb03c2ed3720

  • SHA1

    32313ef5933d5272ba5406f44b958ea8644d35b7

  • SHA256

    b6d92b7f9373ac453524e3b05edd5f1bfeba12b2ee49dd0aee7c6cf03f618dcd

  • SHA512

    73075826bf8e1c3624c2e191b0d41c7549ad6cba8419e98be1d93bcc59a6a2abc0f6dece1760340a63f2366bb19b4cdb72887edf6d6ba3f42f8cab82004a8684

  • SSDEEP

    98304:n6zaW8MdxUint2C6OYt9wpeYthdAO+CmNVImWvYtYAO+Ct4gwrSjF4evdj4zCy39:n6WxMdxUintl1YtcZt8vvE/QtJvVrSJ+

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • b6d92b7f9373ac453524e3b05edd5f1bfeba12b2ee49dd0aee7c6cf03f618dcd
    .apk android arch:arm arch:x86

    com.ionicframework.myapp497288

    com.qihoo.util.StartActivity


Android Permissions

b6d92b7f9373ac453524e3b05edd5f1bfeba12b2ee49dd0aee7c6cf03f618dcd

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE