General

  • Target

    3b5558487a749f6b653a717a1061aee1d44a5e1ed501ac2651de1075ed865913

  • Size

    531KB

  • MD5

    3d62760cc1b53064b7cabb6ba5809aa8

  • SHA1

    87f23e331ed8ffcc5e26d43e38cda7723ca67f3c

  • SHA256

    3b5558487a749f6b653a717a1061aee1d44a5e1ed501ac2651de1075ed865913

  • SHA512

    a18f05ef5aa1c2c08c47f18f0040e2f1c9c11395097bfc56fccc4e44c06d94d0e1fffdc4a9de4c175bf59d1115b99a268b18e873598e58aee7d478d8dfd604d4

  • SSDEEP

    12288:J1vJnNQoG6nIA0uqMa9nWUjojagxLo+ghB5KrnjSw:JVJnCoG630rnWFjHoNhBIHSw

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 3b5558487a749f6b653a717a1061aee1d44a5e1ed501ac2651de1075ed865913
    .apk android

    com.AUTORUS.JapanDrag

    am.xtrack.LolaActivity


Android Permissions

3b5558487a749f6b653a717a1061aee1d44a5e1ed501ac2651de1075ed865913

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE