General

  • Target

    15fd3ff111f44483c4bd3975298623c0N.zip

  • Size

    7.9MB

  • MD5

    15fd3ff111f44483c4bd3975298623c0

  • SHA1

    8b0ee7e7f34aacb65ab957e785c3cb42b8a1c926

  • SHA256

    3896c0c6ddd0f94e74aba1008a64623ec9d1f30a32551a72a437e828b320dfe3

  • SHA512

    fcc382f6bec02ef1df9691d12f0b82ddd5bc154dd722891f585400e6d2b25e7df9a8910ac3512c3a2409e69cac0b76921ada56ead69b1ebb1485728354563b2d

  • SSDEEP

    196608:eNY4WO9CN2nXjrpIrF9OXwq+6PQ8Z7htj:ECcXjlWOAOY8Z7htj

Score
6/10

Malware Config

Signatures

  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Requests dangerous framework permissions 6 IoCs

Files

  • 15fd3ff111f44483c4bd3975298623c0N.zip
    .apk android

    Password: infected

    cosdag.vc4537yret.dfshsd

    com.example.appmydemo.MainActivity


Android Permissions

15fd3ff111f44483c4bd3975298623c0N.zip

Permissions

android.permission.READ_PRIVILEGED_PHONE_STATE

android.permission.READ_SMS

android.permission.INTERNET

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_FINE_LOCATION

cosdag.vc4537yret.dfshsd_READ_PHONE_NUMBERS

android.permission.BLUETOOTH