General

  • Target

    6d9b6e187655cb8fff14ecf99179f4d015f0b8b6b4b246391e1d28785de547ac

  • Size

    16.2MB

  • MD5

    9cf193bd74aaee8c5f3ab16d52cee7ab

  • SHA1

    ae69edf0b265e8d06c1a1988fb79192d8d36dc87

  • SHA256

    6d9b6e187655cb8fff14ecf99179f4d015f0b8b6b4b246391e1d28785de547ac

  • SHA512

    9c6e84c56cc80537da20441a7e43a6cba1719ebda4ae3dbb371f0e1f0e1777a1ec6e16f5d88be03bcc9ed4b037484f6f5442bf2b72f00e6dcca86b694095c6b0

  • SSDEEP

    393216:rDk/KvAOT3MeW7DLW/lddaqjScuZT46sP:/Z8ewDwDZuJTsP

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 6d9b6e187655cb8fff14ecf99179f4d015f0b8b6b4b246391e1d28785de547ac
    .apk android arch:arm

    br.com.tapps.prisonbreak

    com.ansca.corona.CoronaActivity


Android Permissions

6d9b6e187655cb8fff14ecf99179f4d015f0b8b6b4b246391e1d28785de547ac

Permissions

com.android.vending.BILLING

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE