General

  • Target

    7e1dea10efd1a14aa0623ee511b49f3dfe183073f7910826215f5e275a7791c1

  • Size

    23.7MB

  • MD5

    1888877372cc0f7f68671bd29718d21a

  • SHA1

    cba92ca28e4c36a130d10b93d7bbc3b286d2fe25

  • SHA256

    7e1dea10efd1a14aa0623ee511b49f3dfe183073f7910826215f5e275a7791c1

  • SHA512

    5a8bab2be040f6d0208ad28766e5dbfaa534e07f25fd5f0c91b0b1225e813fa85ad9e301edb8fca576d35a20cb56f8a4952ef1f32d728149f8ddee37b492d55a

  • SSDEEP

    393216:7Mx/lLiOzCgfMWZGgToOkoDnWMaKSASUVZZ+C9uYH4xHAXZaAt5Grms9NKpebaTW:7Mx/lLiuXZGgToGUfUVZXhOAXZaAt5GZ

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 7e1dea10efd1a14aa0623ee511b49f3dfe183073f7910826215f5e275a7791c1
    .apk android arch:arm

    com.room8studio.Cyto

    com.inject.InjectActivity


Android Permissions

7e1dea10efd1a14aa0623ee511b49f3dfe183073f7910826215f5e275a7791c1

Permissions

android.permission.INTERNET

android.permission.GET_TASKS

android.permission.ACCESS_NETWORK_STATE

android.permission.SYSTEM_ALERT_WINDOW

com.android.vending.BILLING

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_WIFI_STATE