General

  • Target

    090a0f7a77ad0c22ea6404f1fac612bf82608a10b2bfe27de17e4701c8f93b78.bin

  • Size

    436KB

  • MD5

    b36af35ec896943be6bc7d457ba47649

  • SHA1

    54140316fa5b1d23e30e38f687135988bdfad943

  • SHA256

    090a0f7a77ad0c22ea6404f1fac612bf82608a10b2bfe27de17e4701c8f93b78

  • SHA512

    0d4b5776754d9ab06efd234a2ef409ae7fc3beebbe0f37046efbc5b1e0a0cdb5270563225319f2d49d9decc75c226472813bd7c91f847c0036f8ea55af6d1b9b

  • SSDEEP

    12288:t9AcWyysVeDaNju9+HkAbtT4q+G1R0Pspb:Rys7udAbkkREspb

Score
6/10

Malware Config

Signatures

  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 11 IoCs

Files

  • 090a0f7a77ad0c22ea6404f1fac612bf82608a10b2bfe27de17e4701c8f93b78.bin
    .apk android arch:arm

    ygww.dxzepw.ont

    bea7.vkzdao


Android Permissions

090a0f7a77ad0c22ea6404f1fac612bf82608a10b2bfe27de17e4701c8f93b78.bin

Permissions

android.vjtovqev.pxnvrwe.hegoyauk

android.yllebd.bceqtw.smjfmoxp

android.roig.dbjgvsei.vskch

android.xphnwdfs.qrhjq.sjer

android.squbuq.uvws.tvng

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.MANAGE_EXTERNAL_STORAGE