General

  • Target

    9e8ea1fa7cd752bb21420453cd27283931b32a6bc36793c940d0a1da4e6008d8

  • Size

    27.2MB

  • MD5

    b9cf01420e6d9757445b8d065f6be937

  • SHA1

    0d2d4af8e8c3acb5530332638b75b7e240b63c93

  • SHA256

    9e8ea1fa7cd752bb21420453cd27283931b32a6bc36793c940d0a1da4e6008d8

  • SHA512

    212ac26256ad1b711a320fe8f3d67921a8f35a6b719d446003e1a4a72857391753cc5bcacbfc03c32014ef8865eaadb2ab976a5afb92fea14aec6f9cfb19a526

  • SSDEEP

    786432:0WZ0Zca6t6bWzOP8LFeuZtAcKTfc1A4s/Yg21RmY2:h0ZcT6bWGCFocKTFXYgSUY2

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 4 IoCs

Files

  • 9e8ea1fa7cd752bb21420453cd27283931b32a6bc36793c940d0a1da4e6008d8
    .apk android arch:arm

    com.lixxix.jjhfish

    org.cocos2dx.cpp.AppActivity


Android Permissions

9e8ea1fa7cd752bb21420453cd27283931b32a6bc36793c940d0a1da4e6008d8

Permissions

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.ACCESS_WIFI_STATE

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_COARSE_LOCATION

android.permission.WRITE_SETTINGS