General

  • Target

    8a15eb67986ed57646ac8ea6aab3cdb69f20d6dbbdca8735eba8feba0407a1f1

  • Size

    4.8MB

  • MD5

    c271837fd0254e572d2600985da5d535

  • SHA1

    794e120d101480a555729025762152b8da7b451f

  • SHA256

    8a15eb67986ed57646ac8ea6aab3cdb69f20d6dbbdca8735eba8feba0407a1f1

  • SHA512

    910db1b4a4e38b8c053f8eee9411c94c601f799912682adad71ed32ab927509e89ea45920ded3c11c37ad12b6682b87f38e1f2f45912e466b243dd1a6c9d713a

  • SSDEEP

    98304:wnr1Nl54f303ZOb79YdobpFa6LSy3tkPt2KCAcCReyC9EESeMzthj+DRhyy:wnrTWEpOaqTa6/mM

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • 8a15eb67986ed57646ac8ea6aab3cdb69f20d6dbbdca8735eba8feba0407a1f1
    .apk android arch:arm arch:x86

    com.geteit.andwobble

    com.geteit.wobble.WobbleActivity


Android Permissions

8a15eb67986ed57646ac8ea6aab3cdb69f20d6dbbdca8735eba8feba0407a1f1

Permissions

com.android.vending.BILLING

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE