General

  • Target

    ea0d10558c2c0dc81d864950882a5b3620a154e0b0bdbef7480755698a2ade14

  • Size

    5.4MB

  • MD5

    162a4569c77335f1de9caa2f683a404c

  • SHA1

    715bf8c624ebe4e1ca6cc7696ccd187d3747d3c0

  • SHA256

    ea0d10558c2c0dc81d864950882a5b3620a154e0b0bdbef7480755698a2ade14

  • SHA512

    a6411397c6c22ae74fce72130b53781458a333f38671f7941704850e33fa011d83c6606e89c4d170fa041ecceef56c945c0ef3c2b1a8d42711ef44a90256b6e4

  • SSDEEP

    98304:3J+g/l3EVBFOqE7RmO+zGQSN5ao0ICSbxODUyvlvxoRgS:Z+g9E4qE7RmUQSfa0vbxOdToR9

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 4 IoCs

Files

  • ea0d10558c2c0dc81d864950882a5b3620a154e0b0bdbef7480755698a2ade14
    .apk android arch:arm

    com.uchain.bisale

    com.uchain.bisale.module.launcher.ui.activity.SplashActivity


Android Permissions

ea0d10558c2c0dc81d864950882a5b3620a154e0b0bdbef7480755698a2ade14

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.INTERNET

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.VIBRATE

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_PHONE_STATE