General

  • Target

    a63c21b4c94b6029ee70875137f2feed5ed8c8c17f3e0e49119b31c702fa68da

  • Size

    14.3MB

  • MD5

    40302bbba22f6d901732089730a0d4fe

  • SHA1

    b6766b75e7fba88e5f1b665bbe61a249f948c69b

  • SHA256

    a63c21b4c94b6029ee70875137f2feed5ed8c8c17f3e0e49119b31c702fa68da

  • SHA512

    29637a84bc002b825b0dd6d84bc66db2908bda29728f9a5dba66c250e925d87f4d836a0272e9702988b8851c071281d448c6d54d89d2b85fe3281dce54139dfa

  • SSDEEP

    196608:6bALSj4IprzJXZKhWfYh0R3+HjlGxJ/sI4HQndnynZbQG/vkCf11jmDecGCT/ZBK:i4Im0+5y/s5Qdn6ZbQ6/tK5TRBosHU

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • a63c21b4c94b6029ee70875137f2feed5ed8c8c17f3e0e49119b31c702fa68da
    .apk android arch:arm

    br.com.tapps.myvirtualpetshop

    com.ansca.corona.CoronaActivity


Android Permissions

a63c21b4c94b6029ee70875137f2feed5ed8c8c17f3e0e49119b31c702fa68da

Permissions

com.android.vending.BILLING

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE