General

  • Target

    752fca5220c5cecf3ccfdf1c1538a9646bdb2df71407517db2778dd5bdbaf566

  • Size

    16.4MB

  • MD5

    39afddeccb13a43a943faf548b185691

  • SHA1

    83c66dd37d064a3a9c4188c95e1e715d185496fb

  • SHA256

    752fca5220c5cecf3ccfdf1c1538a9646bdb2df71407517db2778dd5bdbaf566

  • SHA512

    97536e9d128b08c049721c00416765ea719a3f158318f2e2b20bb1c2ddeddf063e23ecdfec6964392d0935a88aafdb471ee90cb8d503d70188ea77a09442df21

  • SSDEEP

    393216:+V1bGgeZY/WDyNpP5s4VdV+3XRbKTWGSFR3zI48zYMyTdr:+V1bGgflpPZVdV+HMTWR758adr

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 752fca5220c5cecf3ccfdf1c1538a9646bdb2df71407517db2778dd5bdbaf566
    .apk android arch:arm

    air.timuzsolutions.waterracing

    .AppEntry


Android Permissions

752fca5220c5cecf3ccfdf1c1538a9646bdb2df71407517db2778dd5bdbaf566

Permissions

air.timuzsolutions.waterracing.permission.C2D_MESSAGE

com.google.android.c2dm.permission.RECEIVE

android.permission.INTERNET

android.permission.WAKE_LOCK

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.GET_ACCOUNTS

com.android.vending.BILLING