General

  • Target

    16ba36adb626fd2058a5b69fbcadf52f58a665abb81fc0c9ffe241cbcf8965c0.bin

  • Size

    2.1MB

  • MD5

    49f05730036ab6763d94754b6ce94800

  • SHA1

    0356fab5b1a47344f0242d1e1203867510011570

  • SHA256

    16ba36adb626fd2058a5b69fbcadf52f58a665abb81fc0c9ffe241cbcf8965c0

  • SHA512

    a54587363344297c0f9b8881b46ec3652b90f881326fab85579c67d73a5a07f97872f8d874d9eeb6985040bf9560e6af57bae2a969f56a40f075ba8ac319d9e0

  • SSDEEP

    49152:iYixsQQbcj/tBvIvBTsXd/2F6ubPNfUgpVzfrcxw:ix/tBvIvBE2kutzfrcxw

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 5 IoCs

Files

  • 16ba36adb626fd2058a5b69fbcadf52f58a665abb81fc0c9ffe241cbcf8965c0.bin
    .apk android

    com.yurgr.jtgrs

    com.tooomiquom.jalopertol.activities.Mactivity


Android Permissions

16ba36adb626fd2058a5b69fbcadf52f58a665abb81fc0c9ffe241cbcf8965c0.bin

Permissions

android.permission.INTERNET

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.ACCESS_NETWORK_STATE

android.permission.REORDER_TASKS

android.permission.REQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALENDAR