General

  • Target

    TrojanSpy.AndroidOS.Infostealer.J.MTB-4a365fc691bce08362298c286fa91da389109a8bc7c74290d026b5c102fa53fcN

  • Size

    8.3MB

  • MD5

    147955bbf8a739de5204aed4c07bb330

  • SHA1

    7533956a2942c77a4f87cdf12e4013575cca9edb

  • SHA256

    4a365fc691bce08362298c286fa91da389109a8bc7c74290d026b5c102fa53fc

  • SHA512

    ef3c1c3f8ec0dd11ab5794b14c4f562b0494039155941ef8ee23e9cd49393e718f604876e3a32e2fbf4843e73774923babe14dd2f771fb8013ce9900de412e3f

  • SSDEEP

    196608:0FZBrosj+rdZ8AIAuzH3fn8+zZowbkf06YBHFhhh:0FZ9osqrD8AZuzP8+Tkf06YBHFhj

Score
6/10

Malware Config

Signatures

  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Requests dangerous framework permissions 6 IoCs

Files

  • TrojanSpy.AndroidOS.Infostealer.J.MTB-4a365fc691bce08362298c286fa91da389109a8bc7c74290d026b5c102fa53fcN
    .apk android

    cosaf.gdas45wtrf.dsafdag

    com.example.appmydemo.MainActivity


Android Permissions

TrojanSpy.AndroidOS.Infostealer.J.MTB-4a365fc691bce08362298c286fa91da389109a8bc7c74290d026b5c102fa53fcN

Permissions

android.permission.READ_PRIVILEGED_PHONE_STATE

android.permission.READ_SMS

android.permission.INTERNET

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_FINE_LOCATION

cosaf.gdas45wtrf.dsafdag_READ_PHONE_NUMBERS

android.permission.BLUETOOTH