General

  • Target

    4bcb6951c5f78c646c19771ff58c2ea749e734ae3fa916f130aeee8e083ca2e4.zip

  • Size

    3.1MB

  • MD5

    c96ad997c0e1616df5b8b50c668e9a99

  • SHA1

    c7ef77197f350cebbb6a7c03e8d5dfb0ffebfc8d

  • SHA256

    242c6bfbfcc88081d3d058f38595d3423d3e4c6a8e781db3bf047d4eefba1f0d

  • SHA512

    289da083030210e63ac35bc0304f05c0c51f091fbf83f55bc668a8bbf3227f9ae29bc4872d67b71b978cbdf06381d554a5b23000bbb904ded907194a5f4fc02c

  • SSDEEP

    98304:1pTCdmfk3wwLbY5w7qqA8N0Y/Wse5Ji3efDCpfj09Ne:yUfk3Xbs1q505J23Wc

Score
6/10

Malware Config

Signatures

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 16 IoCs

Files

  • 4bcb6951c5f78c646c19771ff58c2ea749e734ae3fa916f130aeee8e083ca2e4.zip
    .zip

    Password: infected

  • 4bcb6951c5f78c646c19771ff58c2ea749e734ae3fa916f130aeee8e083ca2e4.apk
    .apk android arch:arm arch:arm64

    com.juzyuwqt.thxxnjvf

    com.fuggdrdm.eafgxupv.hJgBhwZSst


We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.