General

  • Target

    5ddc171dccc5523908e9a6ff45816f1b4a882394bad4c4b05152bbacb914a70d.bin

  • Size

    260KB

  • MD5

    15d0cca3d662575cf146ba1e10fc38ea

  • SHA1

    bcc2fc9b58b07f8b93c71e5f9c1bf2cf501ba311

  • SHA256

    5ddc171dccc5523908e9a6ff45816f1b4a882394bad4c4b05152bbacb914a70d

  • SHA512

    6ed8d3cba9bde17bd9095756eef8baf0bcb38fbdb7d9c6b03fbeb01e5c081142c1c9f0036a691ad6d8d2df66becae043dfc6ff8257e99d0bb011bf1f25e52807

  • SSDEEP

    6144:mo0Tkiwrzwgh67Xcb0RiKLuiCTPm4G4mIGKeCYWSC61:mCVrzwrXcbUh2TO4MHWSCa

Score
6/10

Malware Config

Signatures

  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 11 IoCs

Files

  • 5ddc171dccc5523908e9a6ff45816f1b4a882394bad4c4b05152bbacb914a70d.bin
    .apk android arch:arm

    mqhstzo.hqdlvjoap.dpmxcq.hiulalkz.tzvgt.sapvj

    amq7.hznj


Android Permissions

5ddc171dccc5523908e9a6ff45816f1b4a882394bad4c4b05152bbacb914a70d.bin

Permissions

android.gipmncpu.rfqbuvok.zwfcopt

android.ixliyp.ehaeb.xlwevg

android.yqoquy.xwqc.fsmuroac

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.MANAGE_EXTERNAL_STORAGE

android.permission.READ_PHONE_NUMBERS