Report - 694271_Telegram_Buratino-T.apk

Generic Malware
ScreenShot
Created 2021.07.30 10:39 Machine s1_win7_x6401
Filename 694271_Telegram_Buratino-T.apk
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
1.0
ZERO API file : malware
VT API (file) 35 detected (AndroidOS, Anubis, Android, BankBot, origin, GenericKD, Hqwar, GEN30159, Artemis, Save, Eldorado, AdLibrary, Generisk, a variant of Android, Andr, Dropr, FOTJ, kcloud, Malicious, score, ai score=86)
md5 dc030efa5973ba809bad2f544d9b18d2
sha256 ad2053bc0cf1cc54c5a0f7e6de4653b8012ba349219ac56b27e26e6cf2b96077
ssdeep 24576:Jn/4FMK94P8y791TTrgZXOhljSJKOOlI9heaRYictN2yDMipa1Xx7k:VKaPD59ThQATIf3RX0N2yAipa1BY
imphash
impfuzzy
  Network IP location

Signature (1cnts)

Level Description
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious

Rules (1cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure