General

  • Target

    9be8854e262cad4e0180282c511f3430c32b7cb3f6b7adea1610c66aba7d6b84

  • Size

    19.1MB

  • MD5

    365090d5d60186b8e086ac3268243e39

  • SHA1

    46f399683c7c0d0bf09888bf0a1950cb28105b1b

  • SHA256

    9be8854e262cad4e0180282c511f3430c32b7cb3f6b7adea1610c66aba7d6b84

  • SHA512

    90a69f548c14f3b4ab0ca54d48bdb30a54cae62faf05f0f78c1ef9bda1cf3d0a35fdd20169a51a7aad94d8e8ac35b6a6d66a7cb8939727febe644d33d341ad66

  • SSDEEP

    393216:6b189lhuGi1Yp93lfWebuFCw73AlKsaZWe0VLAONMEQdZ:6p89Oup9lfEFZ7QeRmAOjQdZ

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 9be8854e262cad4e0180282c511f3430c32b7cb3f6b7adea1610c66aba7d6b84
    .apk android arch:arm

    br.com.tapps.machodash

    com.ansca.corona.CoronaActivity


Android Permissions

9be8854e262cad4e0180282c511f3430c32b7cb3f6b7adea1610c66aba7d6b84

Permissions

com.android.vending.BILLING

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE