General

  • Target

    c248c63c7832ca58587b1453b5a46d20

  • Size

    263KB

  • MD5

    c248c63c7832ca58587b1453b5a46d20

  • SHA1

    c02c3e7722519e503da7822fc9bdbe42c07bf4ea

  • SHA256

    7c6000a4724f1c7c0b2d577e4c94f0cb494b7e65d901d1b7de66f9e1dd368929

  • SHA512

    95defaf54649f199051cbea316069973aa6f987d286de82ffc9712172a7439e3102c2a6d6e0382ada5034536065356de9e849f14530cd3c8d269af820c32a03a

  • SSDEEP

    6144:WPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNu:Ii6tQIwsBFa/IvcR9Uu

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • c248c63c7832ca58587b1453b5a46d20
    .apk android

    com.osaka.qwmqqfq.ctipfreq

    system.game.booster.MainActivity


Android Permissions

c248c63c7832ca58587b1453b5a46d20

Permissions

android.permission.SYSTEM_ALERT_WINDOW

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.GET_TASKS

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.GET_ACCOUNTS

com.android.launcher.permission.INSTALL_SHORTCUT

com.android.launcher.permission.UNINSTALL_SHORTCUT

android.permission.RECEIVE_BOOT_COMPLETED