General

  • Target

    4448b8a30e98d53a7045bbaa5a3fb827

  • Size

    14.2MB

  • MD5

    4448b8a30e98d53a7045bbaa5a3fb827

  • SHA1

    e6c0da8657f8d9355f508618ec0a8a1683b91e31

  • SHA256

    5aa1a8c594aca202a589f28362293a8144ee3cdab464f2ef57c52ffca1187f2a

  • SHA512

    bc7eddae49d98e1d68d580740d3f7fefc517d98739942ecf2dec081c49975c2eab6db44c6f388b22b6f862baff75a8bf5288c3ad9f7a207b186dfb3a7cae14d4

  • SSDEEP

    393216:SupKlwcPXyG0RDqFEHzL/+XgLiofha9gI/UudWl:SwmiG5Fc+XYsgI/UUWl

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 4448b8a30e98d53a7045bbaa5a3fb827
    .apk android arch:arm

    com.zckj.jprpjl

    com.zckj.jprpjl.SplashActivity


  • gdtadv2.jar
    .apk android arch:arm64 arch:arm

Android Permissions

4448b8a30e98d53a7045bbaa5a3fb827

Permissions

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE