General

  • Target

    03aae63e932a3ba5a01c9222192f25a9df8f06a203cb681510ef36f7159c6ad7.bin

  • Size

    2.1MB

  • MD5

    a2f09882ef39231fbfacccde553923ec

  • SHA1

    7cc635da72326c8264a65244aacb329a5cf812cc

  • SHA256

    03aae63e932a3ba5a01c9222192f25a9df8f06a203cb681510ef36f7159c6ad7

  • SHA512

    93e32c0f26ee4ee833af9b6b8c99a27b46e3e95e69b965b933f0c70d5ad61b7e92a0ab503b16ac0ebe9bea7fa7bd36cbd627b8367c8dc083ded1f04a5d8c91ad

  • SSDEEP

    49152:iYixsQQbcj/tBNIvBTsXd/2F6ubPNfUgpVzfrcx7:ix/tBNIvBE2kutzfrcx7

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 5 IoCs

Files

  • 03aae63e932a3ba5a01c9222192f25a9df8f06a203cb681510ef36f7159c6ad7.bin
    .apk android

    com.yurgr.jtgrs

    com.tooomiquom.jalopertol.activities.Mactivity


Android Permissions

03aae63e932a3ba5a01c9222192f25a9df8f06a203cb681510ef36f7159c6ad7.bin

Permissions

android.permission.INTERNET

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.ACCESS_NETWORK_STATE

android.permission.REORDER_TASKS

android.permission.REQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALENDAR