General

  • Target

    759dfcdd93455c5ad94c3052da2ee04c5e7e4cf8e63305be56f89ff01a42646c

  • Size

    1.6MB

  • MD5

    727ebcde1e2150d93037e14276e5a26d

  • SHA1

    041c995ccbd6393a9b4d8418bfbbc4ff2725ad65

  • SHA256

    759dfcdd93455c5ad94c3052da2ee04c5e7e4cf8e63305be56f89ff01a42646c

  • SHA512

    01607203825c5d140b05426769dd24a456277932aa9397af39bfb4abfc5f505036667f717e29ec2108c551bd43356df745fc220f1046fd5cda8d53f568d9a527

  • SSDEEP

    49152:9tTFpaDeTFzmho6Dw+CGNmTRDcxLwZCBKBcJvxKPHP:9t5D525CGNgCx8ogSJ5U

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 759dfcdd93455c5ad94c3052da2ee04c5e7e4cf8e63305be56f89ff01a42646c
    .apk android

    com.cyou.cma.clauncher.theme.v5485dd000bec834d04ebf2dd

    com.cyou.cma.clauncher.theme.ThemePreviewActivity


Android Permissions

759dfcdd93455c5ad94c3052da2ee04c5e7e4cf8e63305be56f89ff01a42646c

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.GET_TASKS

android.permission.BROADCAST_STICKY

android.permission.READ_PHONE_STATE