General

  • Target

    b38ee435659ea011ca2f32d18ad4d393

  • Size

    3.3MB

  • MD5

    b38ee435659ea011ca2f32d18ad4d393

  • SHA1

    20f7a1eb44eb4c8cabfc35f2375ae1ef864409cb

  • SHA256

    dfc2e8bb0c4e510da768aa76c89c1b0bb150454d9ad64a66effeea5e7996b290

  • SHA512

    179a92464c240687327a9aff4c02582f9edae8f034df95dfd98374e007b163edcff62e4bfafa02cc49ce0c0bd222ecf4952d56329627924b36c5ac44ef6c312d

  • SSDEEP

    98304:7dka0lLX2LZ/EHALtzvebttAFZI/ztm2j08+:7ma01u/Egdebkoc2jq

Score
6/10

Malware Config

Signatures

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 6 IoCs

Files

  • b38ee435659ea011ca2f32d18ad4d393
    .apk android

    high.actress.journey

    convince.under.apple.xkawvpdxahyhd


Android Permissions

b38ee435659ea011ca2f32d18ad4d393

Permissions

android.permission.CALL_PHONE

android.permission.RECEIVE_SMS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.WAKE_LOCK

android.permission.READ_PHONE_STATE

android.permission.READ_CONTACTS

android.permission.READ_SMS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.INTERNET

android.permission.REQUEST_DELETE_PACKAGES

android.permission.SEND_SMS