General

  • Target

    4bcb6951c5f78c646c19771ff58c2ea749e734ae3fa916f130aeee8e083ca2e4.zip

  • Size

    3.1MB

  • MD5

    c96ad997c0e1616df5b8b50c668e9a99

  • SHA1

    c7ef77197f350cebbb6a7c03e8d5dfb0ffebfc8d

  • SHA256

    242c6bfbfcc88081d3d058f38595d3423d3e4c6a8e781db3bf047d4eefba1f0d

  • SHA512

    289da083030210e63ac35bc0304f05c0c51f091fbf83f55bc668a8bbf3227f9ae29bc4872d67b71b978cbdf06381d554a5b23000bbb904ded907194a5f4fc02c

  • SSDEEP

    98304:1pTCdmfk3wwLbY5w7qqA8N0Y/Wse5Ji3efDCpfj09Ne:yUfk3Xbs1q505J23Wc

Score
6/10

Malware Config

Signatures

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 16 IoCs

Files

  • 4bcb6951c5f78c646c19771ff58c2ea749e734ae3fa916f130aeee8e083ca2e4.zip
    .zip

    Password: infected

  • 4bcb6951c5f78c646c19771ff58c2ea749e734ae3fa916f130aeee8e083ca2e4.apk
    .apk android arch:arm arch:arm64

    com.juzyuwqt.thxxnjvf

    com.fuggdrdm.eafgxupv.hJgBhwZSst