General

  • Target

    3bb05c8c6865a071ad4c293811c8fdd7580e33e0d5483db33082172c8bc2cc73

  • Size

    8.4MB

  • MD5

    bd00428d52ab48809177b61b90e45685

  • SHA1

    75ea7f94ca74fcba014cf90f488212748b9063a4

  • SHA256

    3bb05c8c6865a071ad4c293811c8fdd7580e33e0d5483db33082172c8bc2cc73

  • SHA512

    40a51692e46339ec22f172f14ffe1a5fd828af161263ffb583e552b74b354dca89bc0150d63d56adc561fa8863f1abd2f706eee391fb63e933e47539bae2e108

  • SSDEEP

    196608:KCCmOLs2ptAniW6ffltjuCD4bXWU3JAyuYdvJ546VI7:imj2ptaz6XvNDaGIAW54F

Score
10/10

Malware Config

Signatures

  • Coper_DGA_Strings 4 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • 3bb05c8c6865a071ad4c293811c8fdd7580e33e0d5483db33082172c8bc2cc73
    .apk android

    com.industry.advice

    com.cradle.spatial.Zcousinfat


  • base.apk
    .apk android arch:x86 arch:x64 arch:arm arch:arm64

    com.xautomation7_trash

    com.xautomation7_trash.xzX6iOD


Android Permissions

3bb05c8c6865a071ad4c293811c8fdd7580e33e0d5483db33082172c8bc2cc73

Permissions

android.permission.REQUEST_INSTALL_PACKAGES