General

  • Target

    IIG.apk

  • Size

    3.3MB

  • MD5

    05b72c82467e487975b4f7cedbba4e33

  • SHA1

    1609ddd44090a6a8c8fde4232b1231badcc2f99c

  • SHA256

    a1f73390c2038aad15511f03cb493f46c81aa2fc20bf6d12be9e694cdd78de05

  • SHA512

    53465d9d7235ac96b6d7af0b54a2ab5d7bfdd1e6d1e5a2c26ca50681bf1bad169e4577b4b9c9cf8138e6df9a3d3fe664ca3f0b8c8f5fcf6eba1b07dc3ff7325b

  • SSDEEP

    49152:WE15W1t3KtC1YHNEjL0oOpx2PWoxnVcCdgRVKlNHsBDGrkvUPPW6p3Vq1snIjmh4:B2ct+n09pIPWoxnVTRlR0U58mzC

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 7 IoCs

Files

  • IIG.apk
    .apk android

    cn.iig.IIGlop

    com.rummy.tttss.activity.MainActivity


Android Permissions

IIG.apk

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_MEDIA_VISUAL_USER_SELECTED

android.permission.READ_MEDIA_IMAGES

android.permission.READ_MEDIA_VIDEO

android.permission.READ_MEDIA_AUDIO

android.permission.ACCESS_WIFI_STATE

cn.iig.IIGlop.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION