General

  • Target

    a9d4ae0fdb6a46671279867ba8d1667a3003bb219ee143ea444ab37ea2c88547

  • Size

    31.2MB

  • MD5

    546cb6a80b2b44b5639eb70827d4499d

  • SHA1

    6bf373e94764a9247cd2ec22c5a5b078dac3cce2

  • SHA256

    a9d4ae0fdb6a46671279867ba8d1667a3003bb219ee143ea444ab37ea2c88547

  • SHA512

    bbae2a79a2f82acf6d0b8eb943c66a60c787e3be0c012fb57055945495ea5dcfd25a8ba0a2169c22eccc85b880eab9459c54aa9f0c902c80d4826791a397666c

  • SSDEEP

    786432:IQ5YOOSzUxLKKBDDrrC/T9TuYEjUrqI/Ih0NiZN:8HHZDPrC/T9TdZrqthVb

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 2 IoCs

Files

  • a9d4ae0fdb6a46671279867ba8d1667a3003bb219ee143ea444ab37ea2c88547
    .apk android arch:arm arch:x86

    com.rsgapps.reactor

    com.unity3d.player.UnityPlayerActivity


  • zst24.bin
    .apk android arch:arm

    com.rtk.app

    com.rtk.app.Welcome


Android Permissions

a9d4ae0fdb6a46671279867ba8d1667a3003bb219ee143ea444ab37ea2c88547

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_COARSE_LOCATION

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_WIFI_STATE

com.android.vending.BILLING

android.permission.VIBRATE