General

  • Target

    aa4e617104dddd7ff0b431b83e87fee77a7e664ca34f5be29a82927e9a8239f6

  • Size

    16.8MB

  • MD5

    3c4aeb337b89d35f17fae3a97d1acf10

  • SHA1

    8a8a79ca6e83a849d10eef79a6ca197c5e7778b6

  • SHA256

    aa4e617104dddd7ff0b431b83e87fee77a7e664ca34f5be29a82927e9a8239f6

  • SHA512

    5ea6d519294be06179dd60b79e3e09eb5353b1c79a97fc85b49782d0777989022c5209c4b42867873337ea86ccea20cbc3fa7136071b011685a90ddb31bd78c4

  • SSDEEP

    393216:z/i+0MJo5SaYG0s3eqKAnwylzyOzTHdS40Gdric3omcLG4HB:VWQ8eqK2wylbLdlfomcLG4h

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • aa4e617104dddd7ff0b431b83e87fee77a7e664ca34f5be29a82927e9a8239f6
    .apk android arch:arm

    br.com.tapps.magicmatch

    com.ansca.corona.CoronaActivity


Android Permissions

aa4e617104dddd7ff0b431b83e87fee77a7e664ca34f5be29a82927e9a8239f6

Permissions

android.permission.INTERNET

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

com.android.vending.BILLING

android.permission.READ_PHONE_STATE