General

  • Target

    com.example.smsread.apk

  • Size

    5.3MB

  • MD5

    36edd995cd74a52c1beccdd37e2a8afb

  • SHA1

    2a153c40632ae1d170597de559697316bab8c219

  • SHA256

    ddd48bcca9e70e6c19534718474b7796822887af1d7ccff723ed1e603180275e

  • SHA512

    9abbd63de50ff454e748d9a4fc7c714b63f4a53684c4c5cfbc3894a823ca3e037d0ce2d11ae2a9e00b7485979fe619bc01dca02cf9f7d1921f80828278459e8f

  • SSDEEP

    98304:elgV3I65u9dDSRVck4rH9ip6cNQ+O4vGwyXxjFAQS+82trLIRDOcAU1zeKU:elb94VAb8kc2McjFA68ioDrA+eKU

Score
6/10

Malware Config

Signatures

  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Requests dangerous framework permissions 2 IoCs

Files

  • com.example.smsread.apk
    .apk android

    com.example.smsread

    com.example.smsread.MainActivity


Android Permissions

com.example.smsread.apk

Permissions

android.permission.RECEIVE_SMS

android.permission.SEND_SMS

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

com.example.smsread.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION