General

  • Target

    f4778e1708b4679e97941b632fa2934e4ba335ed96ee3b21bc55358412d70e7f.bin

  • Size

    2.1MB

  • MD5

    72d3960e87e2b276136c3871acc75c7f

  • SHA1

    a48bc2285b18aa4267bc9315133b1e35fc409996

  • SHA256

    f4778e1708b4679e97941b632fa2934e4ba335ed96ee3b21bc55358412d70e7f

  • SHA512

    ea299677a9d3b899824211b79e3ebe2a2eb85a259d8cf9a2257ea9cc61dfb4be947613eece425f5c26af417223675a4e9338ae8cadac21c2c064f9bd8a91cd18

  • SSDEEP

    49152:RucvuwLDXaDBcZFCV5IvBTsXd/2F6ubPNfUgpVzfrcxx:5vugDkcZoIvBE2kutzfrcxx

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 5 IoCs

Files

  • f4778e1708b4679e97941b632fa2934e4ba335ed96ee3b21bc55358412d70e7f.bin
    .apk android

    com.yurgr.jtgrs

    com.tooomiquom.jalopertol.activities.Mactivity


Android Permissions

f4778e1708b4679e97941b632fa2934e4ba335ed96ee3b21bc55358412d70e7f.bin

Permissions

android.permission.INTERNET

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.ACCESS_NETWORK_STATE

android.permission.REORDER_TASKS

android.permission.REQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALENDAR