General

  • Target

    4b0c4419cb96f3d30be4b66952507c69610cb7d2b05f564bdcf32affb6115262

  • Size

    8.9MB

  • MD5

    f1c5f85dd0211241dc04b47c394a6b97

  • SHA1

    4c67ea218230a004a2e84b158facc975dbf2ccb2

  • SHA256

    4b0c4419cb96f3d30be4b66952507c69610cb7d2b05f564bdcf32affb6115262

  • SHA512

    5b967977a02a6a7f5c52e866f1270f29186d150847e0a194444267f494fde7ff0ad6dccdb73ec481f5a84dfd2fb3e46f3462d16515e4e488c88a0cbdd7a7f463

  • SSDEEP

    196608:fGRxCKykKLorTi/zThx2/pUyIUGTRDXbiobLitDq7ox:vnorTi/5xbcG1biobLik7Q

Score
10/10

Malware Config

Signatures

  • Coper_DGA_Strings 4 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • 4b0c4419cb96f3d30be4b66952507c69610cb7d2b05f564bdcf32affb6115262
    .apk android

    com.minor.scrap

    com.false.monster.Csufferconvince


  • base.apk
    .apk android arch:x86 arch:arm64 arch:x64 arch:arm

    com.pcloud74bookmarksconnect

    com.pcloud74bookmarksconnect.uldPWnLOPq


Android Permissions

4b0c4419cb96f3d30be4b66952507c69610cb7d2b05f564bdcf32affb6115262

Permissions

android.permission.REQUEST_INSTALL_PACKAGES