General

  • Target

    7df4b4cf3e56cda1493ddbd4bbcb634b15b61daa4a9e60f7ed3ab655cd9f1ba4

  • Size

    28.4MB

  • MD5

    68d7ce39369265798ed73b47003feb92

  • SHA1

    75b56b184eabbfdb2422e1534f46640ac220c2c4

  • SHA256

    7df4b4cf3e56cda1493ddbd4bbcb634b15b61daa4a9e60f7ed3ab655cd9f1ba4

  • SHA512

    aa682e23e3a3b2be4d263b7fa92ab7cb9aea8afd05baf9262cb9f66ce3dd4c9429de790ad679779a019e22421e3e2e92d85302e3253f2ce1ef87930cae7e8df1

  • SSDEEP

    786432:M0IW5fkIDO8uLLciFFe1r+9ObWFxGUnp4Dc7:MD+y8EL9ve1uOaxP7

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • 7df4b4cf3e56cda1493ddbd4bbcb634b15b61daa4a9e60f7ed3ab655cd9f1ba4
    .apk android arch:arm

    com.uncleciba.brain2split

    com.unity3d.player.UnityPlayerActivity


Android Permissions

7df4b4cf3e56cda1493ddbd4bbcb634b15b61daa4a9e60f7ed3ab655cd9f1ba4

Permissions

com.android.vending.BILLING

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE