General

  • Target

    f179c4652d40aa7fc155078d6c73e1cd22694ccac6b03b048d73e90b83f113f5

  • Size

    4.3MB

  • MD5

    60be12d83b86af708e340eb7c37f71ac

  • SHA1

    3ebda4c99d9e30963e6f27b22fc5d08373e7106b

  • SHA256

    f179c4652d40aa7fc155078d6c73e1cd22694ccac6b03b048d73e90b83f113f5

  • SHA512

    45b1c0f16594bb721fe099aba13afd7b9fa670feebd17b9e0b1e8e54eee1426760284b98abba1c93ebb6c39241c8f7c6e290bf1ddb6229ffac40351a10988543

  • SSDEEP

    98304:TZJcygreHSeEqvd/x1MD6/11koC+HfAGz4ZriB+LDuA2:TvctreyeE0xP/UMcWnA2

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 4 IoCs

Files

  • f179c4652d40aa7fc155078d6c73e1cd22694ccac6b03b048d73e90b83f113f5
    .apk android arch:arm arch:mips arch:x86

    com.vcread.android.pad.xincaifu

    com.qihoo.util.StartActivity


  • alipay_plugin_20120428msp.apk
    .apk android

    com.alipay.android.app

    .Cashier


Android Permissions

f179c4652d40aa7fc155078d6c73e1cd22694ccac6b03b048d73e90b83f113f5

Permissions

android.permission.READ_PHONE_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.INTERNET

android.permission.ACCES_MOCK_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.KILL_BACKGROUND_PROCESSES

com.android.vending.BILLING

android.permission.WRITE_SETTINGS

android.permission.GET_TASKS

android.permission.CHANGE_WIFI_STATE