Genuine fakenews address, infesting android users with AndroidOS/GenBl.3AE5FB

Where we found this: httxs://8ch.net/qresearch/res/5262118.html#q5281628
Stems coming from CloudFlare, Google, USA, and info from pure and genuine fake news conspiracy sources.

Communicating Files Date scanned Detections File type Name 2019-02-28 1/54 Android b00e6ffc1806022210e5968a6d1afb5c8b990d205deed31181658cba4408ffc5 Serving up AndroidOS/GenBl.3AE5FB2D!Olympus malcode.

Source also to consider: https://www.shodan.io/host/104.18.105.234

Originates most likely from this campaign source, seen the relation with used zepto technology, with an additional threat record:
https://unit42.paloaltonetworks.com/unit42-afraidgate-major-exploit-kit-campaign-switches-from-cryptxxx-ransomware-back-to-locky/
source credits go to #sockpuppet

polonus (volunteer website security analyst and website error-hunter)

Communicating Files Date scanned Detections File type Name [b]2019-02-28[/b] 1/54 Android b00e6ffc1806022210e5968a6d1afb5c8b990d205deed31181658cba4408ffc5 Serving up AndroidOS/GenBl.3AE5FB2D!Olympus malcode.
and a fresh scan say clean ;) https://www.virustotal.com/#/file/b00e6ffc1806022210e5968a6d1afb5c8b990d205deed31181658cba4408ffc5/detection

Thanks, Pondus, for a second opinion check and final verdict.

Anyways these permissions won’t go for me:

Permissions android.permission.INTERNET android.permission.NFC android.permission.WRITE_EXTERNAL_STORAGE

33 security recommendations for that site: https://webhint.io/scanner/78666eaa-52c3-4b52-a01f-4fe44d3c7a50#Security

polonus