General

  • Target

    9706676c10b3ce970a8851ae2c3a8389ba3cb4ccb74312cc523706aac443e95c.bin

  • Size

    396KB

  • MD5

    e204261e0dc23e4d04d3eb82839dd6a8

  • SHA1

    8e824165b3c41960c09c96703ee7fe95c6a87a13

  • SHA256

    9706676c10b3ce970a8851ae2c3a8389ba3cb4ccb74312cc523706aac443e95c

  • SHA512

    b9adbcbbc9f82f37a24cfcfdf550953b5744a050f94a8a623ed254bdeedaa3321fc3cd663d9e1069c0278f1165d855df9e87b8432fb6a0a33a739cdb5f3b83da

  • SSDEEP

    6144:+wyTKnVnyiz3KZNwEEPDByj/OudQSVaG0XoFjuz2/70jjcJ17tT6zzeXXj/:seVP3qNcbBuF8Kjuz+7wAxtT4W7

Score
6/10

Malware Config

Signatures

  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 11 IoCs

Files

  • 9706676c10b3ce970a8851ae2c3a8389ba3cb4ccb74312cc523706aac443e95c.bin
    .apk android arch:arm

    xpiv.zsbahd.rhy.tnoef.al.pc

    yfy7.lceu


Android Permissions

9706676c10b3ce970a8851ae2c3a8389ba3cb4ccb74312cc523706aac443e95c.bin

Permissions

android.idomoia.dfpnajps.lnjrqjw

android.qdwei.jndgi.xgkanw

android.umipsqlr.qitl.vhtxtlej

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.MANAGE_EXTERNAL_STORAGE