General

  • Target

    636306f32e0b0689e2cae188f0d213d0f8985c11b34a29dade629144f27b11af.bin

  • Size

    1.9MB

  • MD5

    61b4437780be2ebe517192911bc02159

  • SHA1

    9850c939f1ead8091429bf426d414175acf50e24

  • SHA256

    636306f32e0b0689e2cae188f0d213d0f8985c11b34a29dade629144f27b11af

  • SHA512

    124425320b1840639298dfb4b7717d9c8fe351566a33521bad57f83e4bc8f229449604f1b5788c5d8fe21bcbe4cc20f71803c3e28c711eac16064e4d450c9fdb

  • SSDEEP

    49152:FVKmwoaqLi1OdPstrM7Jsh5Fe5WKPgpqzfrr7d:DJwFV1j4FWYjzfrr7d

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 5 IoCs

Files

  • 636306f32e0b0689e2cae188f0d213d0f8985c11b34a29dade629144f27b11af.bin
    .apk android

    com.yurgr.jtgrs

    com.teololplo.minteilorsomico.activities.Mactivity


Android Permissions

636306f32e0b0689e2cae188f0d213d0f8985c11b34a29dade629144f27b11af.bin

Permissions

android.permission.INTERNET

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.ACCESS_NETWORK_STATE

android.permission.REORDER_TASKS

android.permission.REQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALENDAR