General

  • Target

    bd065368b44312def4c5d5da8813a3cd0096b14351ec1323ceae26d628e74e60.bin

  • Size

    2.3MB

  • MD5

    300e01f4e6da8e47101d07a84c969269

  • SHA1

    b6cd3e9eeb4de37c89b58d68e078e317a0c9d748

  • SHA256

    bd065368b44312def4c5d5da8813a3cd0096b14351ec1323ceae26d628e74e60

  • SHA512

    0140de5a0c88e7f390933de10df1583b5289589f99a25c42fcceac584b39db7c7ca92a0fbade4afb9570343680dee6fb2e49821943f3404c03d89dde07007100

  • SSDEEP

    49152:RUDMxHizTtWO2osdzhPT3XS7SaTHgASkGfwTAj/I0QvsTor20Q+r:dFizgloyz56tgnkGITxIwg+r

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 6 IoCs

Files

  • bd065368b44312def4c5d5da8813a3cd0096b14351ec1323ceae26d628e74e60.bin
    .apk android arch:arm64 arch:arm arch:x86 arch:x64

    top.rlyun.gg

    top.rlyun.gg.MainActivity


Android Permissions

bd065368b44312def4c5d5da8813a3cd0096b14351ec1323ceae26d628e74e60.bin

Permissions

android.permission.ACCESS_SUPERUSER

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_CLIPBOARD

android.permission.WRITE_CLIPBOARD

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.WRITE_MEDIA_STORAGE

android.permission.VIBRATE

android.permission.INTERNET

android.permission.WRITE_SETTINGS

android.permission.ACCESS_NETWORK_STATE

android.permission.GET_TASKS

android.permission.REAL_GET_TASKS

android.permission.GET_DETAILED_TASKS

android.permission.INTERACT_ACROSS_USERS

android.permission.INTERACT_ACROSS_USERS_FULL

android.permission.READ_LOGS

android.permission.UPDATE_APP_OPS_STATS

android.permission.CHANGE_COMPONENT_ENABLED_STATE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.REQUEST_DELETE_PACKAGES

android.permission.READ_PHONE_STATE