General

  • Target

    a49d21e896af84d61bf727cea5c429ed0cbf7636d0e0818f98e76951eaee06c1

  • Size

    29.9MB

  • MD5

    9192ad61df627fac864eb693e8db4e3c

  • SHA1

    b0e4516b34934ff4d3e4b8add3070f096f745a0c

  • SHA256

    a49d21e896af84d61bf727cea5c429ed0cbf7636d0e0818f98e76951eaee06c1

  • SHA512

    f26610f08a0138b6cc206a57e01089570bbd76b90872edd256d82c787eb1dcbba7306c89ffc1d9e1027382be9ba4a2ef9ae6696538a496e29664b257d1c14e21

  • SSDEEP

    786432:iCYayOyutZLtZF4d/aA2NhY261aJ7ttZBMETm8cPA0KiW9DeB:iuodxEYFgJ7tt/9iPYiSc

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 1 IoCs

Files

  • a49d21e896af84d61bf727cea5c429ed0cbf7636d0e0818f98e76951eaee06c1
    .apk android arch:arm

    com.tabtale.pizzamaker

    com.tabtale.mpandroid.MainActivity


Android Permissions

a49d21e896af84d61bf727cea5c429ed0cbf7636d0e0818f98e76951eaee06c1

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

com.android.vending.BILLING

android.permission.VIBRATE