General

  • Target

    d807070973bde0d85f260950dc764e46a0ba486f62da3e62f3b229ca3ea322f1.zip

  • Size

    2.1MB

  • MD5

    c08e64211bdd44d68d1e9d5abaa09c97

  • SHA1

    3dd6896424d4f3a4c4c4354bb3764698bab9f552

  • SHA256

    948e8aa66b3d8278ef6eca8fd682c83c7ab47c85d370a1f9e22a24a1d7284cf5

  • SHA512

    47a3f257466c1976a5b0eac7a7ba32dc7173d8318eaf706c77dfee76494779981019b487875d109429776e5d4de82d5dfaeb3f309a2c14256782538bba4ea46d

  • SSDEEP

    49152:qI5HyNE//tt/9BMMVBJaMwRrqWxtBSeqCPdHm:qI1yNOvM7Mw8Wxt/tm

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 22 IoCs

Files

  • d807070973bde0d85f260950dc764e46a0ba486f62da3e62f3b229ca3ea322f1.zip
    .zip

    Password: infected

  • d807070973bde0d85f260950dc764e46a0ba486f62da3e62f3b229ca3ea322f1
    .apk android arch:arm64 arch:arm

    jcwAz.EpLIq.vcAZiUGZpK

    com.brkwl.upstracking.MainActivity