General

  • Target

    e6e530f74ba97392f6540bfba7dff0d3ff0a5f4142ac6a674252cfbe47dde702.zip

  • Size

    2.8MB

  • MD5

    84b42f315067bb7a57e06a68363bb882

  • SHA1

    47df038388be79d4911b6209af8e16c7157bd8aa

  • SHA256

    2657e3be2c2bbb0bd2b5104f6ca27fa7d33b8d1a2f3729bdb28e796039969589

  • SHA512

    48c636c045d008e7120fe1c5d478a9fe4a7681dfdf674c0b15d9626c9abe3205ccdb007a48bc293661de2ac6e5031d33e2e77cac36b6b9ccbdfa27fb9dac8e92

  • SSDEEP

    49152:H9qBitxI8MmFjNulcZFoAdBhPCM/aFXK9yueSMHm1aARZVjenJHbUGGhzYXs4muw:dyitK8MmFjKcZNdBhlahK9yRSim1lYnU

Score
6/10

Malware Config

Signatures

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 16 IoCs

Files

  • e6e530f74ba97392f6540bfba7dff0d3ff0a5f4142ac6a674252cfbe47dde702.zip
    .zip

    Password: infected

  • e6e530f74ba97392f6540bfba7dff0d3ff0a5f4142ac6a674252cfbe47dde702.apk
    .apk android arch:arm arch:arm64

    com.rtrdyebw.ckpelexv

    com.rtrdyebw.ckpelexv.aUjVfMmNQZ