General

  • Target

    c8325591a08ddd190259bfcd6338467eeeca9509ccd995c4d6f70f04e16eb2e9

  • Size

    3.2MB

  • MD5

    f2258775ca3ba5de9803860dff65acba

  • SHA1

    3afbbccf3474f16f31263b55a82e0d4094765fc7

  • SHA256

    c8325591a08ddd190259bfcd6338467eeeca9509ccd995c4d6f70f04e16eb2e9

  • SHA512

    7a1b8e24cb8ac89d3ae014782af035d5aa805abb83ad71f3a643110e6c7cf7b92e5c9529cc87eba2b8c3e1ce3944bdad40eebd56746a2c359d2fddb1bf274797

  • SSDEEP

    49152:0mSbdi1YuGrNHynLHXnl5GzgJXgMvK3gFBvD6lLn4S0+A1QzhoNqs2nZkoRuzi/c:firuZTXldgQF6+S0+aQ1o0sKZXYeE

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • c8325591a08ddd190259bfcd6338467eeeca9509ccd995c4d6f70f04e16eb2e9
    .apk android arch:arm

    com.jiasoft.swreader

    com.jiasoft.swreader.MainActivity


  • alipay_plugin_20120428msp.apk
    .apk android arch:arm

    com.alipay.android.app

    .activity.Cashier


Android Permissions

c8325591a08ddd190259bfcd6338467eeeca9509ccd995c4d6f70f04e16eb2e9

Permissions

com.android.launcher.permission.INSTALL_SHORTCUT

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_WIFI_STATE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.SEND_SMS