General

  • Target

    c36639507155f1ab848709fe5bc86e26bc281554da71c5e085922e76ffba7772

  • Size

    5.0MB

  • MD5

    40263fdc6787f72fdbd28f6c54894f27

  • SHA1

    a990001c875f25ec25e60312c5b06024eb9b80b4

  • SHA256

    c36639507155f1ab848709fe5bc86e26bc281554da71c5e085922e76ffba7772

  • SHA512

    d05aa827681f2595225f17fd24bb22a5795142f213fd861291b43d9510b9957e68dc6a5823ed99b768c72de185b077637ee297d5de643cec39374989c79abb1e

  • SSDEEP

    98304:9j12QIkXPnMbx+cpOan6Lq3lh7LiPIljnU4VKIsekq8K4zIrHlsfy/5:9tIkXfUXxeq1h/OIlTU4VKIsekq8KSIx

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • c36639507155f1ab848709fe5bc86e26bc281554da71c5e085922e76ffba7772
    .apk android

    com.xiaohx2015.pifubsgl

    com.zhuaz.moban.MAboutActivity


  • youyou_c
    .apk android

Android Permissions

c36639507155f1ab848709fe5bc86e26bc281554da71c5e085922e76ffba7772

Permissions

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_COARSE_LOCATION

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.READ_SETTINGS