General

  • Target

    756d36ebc69231b2faa2db822d5b2e7ea401b0b9738765e4e5010719b9010ed6

  • Size

    8.8MB

  • MD5

    d9504c1962ff9418e77d67ec270eac01

  • SHA1

    85cbd96a68ac1793c93d8932fbc1aa6a878164ff

  • SHA256

    756d36ebc69231b2faa2db822d5b2e7ea401b0b9738765e4e5010719b9010ed6

  • SHA512

    4fa06d7240fd59c29436aa0d7c5f2ddf47c6be8753ef5a8650555b5c1d21b2a67fa59560c215097cfa0f1f98ce6afd169b7ed18681807ed24c7d43655e1609d0

  • SSDEEP

    196608:4XaJmwZmJvCYtnGD52m8R/kO7+26qETHJjvnqCvojW:4Kedm52mUkO7+2rETHlvqCvj

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 756d36ebc69231b2faa2db822d5b2e7ea401b0b9738765e4e5010719b9010ed6
    .apk android arch:arm

    com.robtopx.memoryMastermind

    com.inject.InjectActivity


Android Permissions

756d36ebc69231b2faa2db822d5b2e7ea401b0b9738765e4e5010719b9010ed6

Permissions

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_WIFI_STATE

com.android.vending.BILLING