General

  • Target

    73ff425b05c064b1c4526cf8ebc58021684f2afb24e3005b1db9c2fba4c48344.bin

  • Size

    4.0MB

  • MD5

    fcd64347ea78cc7941ec65e1936fe0b1

  • SHA1

    1336c077de3276a07ce57c56babea0dbbc296274

  • SHA256

    73ff425b05c064b1c4526cf8ebc58021684f2afb24e3005b1db9c2fba4c48344

  • SHA512

    28e2126a539ec379cacf7201df28a518f4fbad092e8895b598e1717a1c93cb44c4f7a79d341373ed34760b575fcd0d2b14b4f181f5d99828d1d5267d720eb202

  • SSDEEP

    98304:m+LxXRScMF/AwB8vkF2Hb1OStUB35sxOfK8JjtjLQg3JUdzF:m+LxXPs/Hz2OStUPsxOyU5QAKF

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 73ff425b05c064b1c4526cf8ebc58021684f2afb24e3005b1db9c2fba4c48344.bin
    .apk android

    com.ilogen.deliver

    l570.k90mpt.fv00d3


Android Permissions

73ff425b05c064b1c4526cf8ebc58021684f2afb24e3005b1db9c2fba4c48344.bin

Permissions

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.QUERY_ALL_PACKAGES

android.permission.REQUEST_INSTALL_PACKAGES