General

  • Target

    7f88e9c866ebbb743be1486785fa87b224a3a25da117c05701106d11ec246258

  • Size

    11.8MB

  • MD5

    fbd9e92603604755893f1f474d482221

  • SHA1

    4609b33790e823a48883aec7f6f35c3249d8f632

  • SHA256

    7f88e9c866ebbb743be1486785fa87b224a3a25da117c05701106d11ec246258

  • SHA512

    3345cae7dffe9cd738d4d227bbb5d3dd7ce2ee382b32c0f645dcd5b34ce86c339bcd3b43f86f7daf36db8b6e176bef45c3205184c30b0e6f43217071a29dde3e

  • SSDEEP

    196608:gT4LK5i/jh2xje/1+pXjUI5sRwUui3eojnSJBARtpXCuVHh7RElY9A:bK5i/tXgFjUI5BUT3CBARtpSS4J

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 4 IoCs

Files

  • 7f88e9c866ebbb743be1486785fa87b224a3a25da117c05701106d11ec246258
    .apk android arch:arm

    com.towardmobile.fistofhero

    com.ansca.corona.CoronaActivity


Android Permissions

7f88e9c866ebbb743be1486785fa87b224a3a25da117c05701106d11ec246258

Permissions

android.permission.READ_EXTERNAL_STORAGE

android.permission.SYSTEM_ALERT_WINDOW

android.permission.GET_TASKS

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE

com.android.vending.BILLING

com.android.vending.CHECK_LICENSE