General

  • Target

    vbug-master.zip

  • Size

    7.0MB

  • MD5

    d52796122c1bb06a92d36e3fd18ea9ad

  • SHA1

    c49f161e6cdc601119c550c037384f0d02b8d3b5

  • SHA256

    cf4ace71e2fb09825dca8f3a1e0180708cd62050561d733027cc1d6b46d184a4

  • SHA512

    4b37348d7acd1f2c29298b791c7aff3d680774376c9cffa1bd5630d8dae0aa7d82270669def0d1a366fb9433d8cf75ed704d2de9e9ccff3b0e7a4b1a1c780c3a

  • SSDEEP

    196608:CnxsdQzjS0NHbwDezbdTyFpprAQQsmqqD2:CnxQ0jScHbwyzxTyFpprA7smjD2

Score
10/10

Malware Config

Signatures

  • Wipelock Android payload 2 IoCs
  • Wipelock family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 2 IoCs

Files

  • vbug-master.zip
    .zip
  • vbug-master/.image/vbug01.png
    .png
  • vbug-master/.image/vbug02.png
    .png
  • vbug-master/README.md
  • vbug-master/vbug-AIDE.apk
    .apk android

    sec.blackhole.vbug

    sec.blackhole.vbug.MainActivity


  • vbug-master/vbug-DS.apk
    .apk android arch:arm

    sec.blackhole.vbug

    com.smartphoneremote.androidscriptfree.AndroidScriptFree


  • elite.vbk
    .apk android

    com.elite

    com.elite.MainActivity


  • fbcr.vbk
    .apk android arch:arm

    com.example.forkbomb

    com.example.forkbomb.MainActivity


  • mobelejen.vbk
    .apk android

    com.elite

    com.elite.MainActivity


  • vi4a.vbk
    .apk android

    com.google.android.virus

    VirusActivity


  • vbug-master/vbug.py
    .py .sh linux