General

  • Target

    7b4baa854e3c7b6b6d6c9b0af80c3667411f47f821a9e04eca29977bc2d01e08

  • Size

    15.2MB

  • MD5

    e9bcdd0ecbddddaab531342b3bf6a94c

  • SHA1

    9f8606bc4469118689d75ab99bb4403b9a343589

  • SHA256

    7b4baa854e3c7b6b6d6c9b0af80c3667411f47f821a9e04eca29977bc2d01e08

  • SHA512

    6fd0ca89e41c4900231b036eef327aa840290e17feb4569980db0570cf52741cfe0bca59637cdf8843cbe7acb9c14a4322a560053476377feb5f003c3b5ee333

  • SSDEEP

    393216:M3vMjJWCkHssKmX4kTJhf69dEjd95V+/2M8sZJLkcV:eMj/kHsBkh3XKqiJYM

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • 7b4baa854e3c7b6b6d6c9b0af80c3667411f47f821a9e04eca29977bc2d01e08
    .apk android arch:arm arch:mips arch:x86

    thirty.six.dev.underworld

    .GameActivity


Android Permissions

7b4baa854e3c7b6b6d6c9b0af80c3667411f47f821a9e04eca29977bc2d01e08

Permissions

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

com.android.vending.BILLING