General

  • Target

    aa73aa782d43903550a0770b012f25b522bb113e93f568e96bde3420d9d173f8

  • Size

    6.2MB

  • MD5

    6ae4d25bd60b0b2994af56bbed5a93f7

  • SHA1

    a029390ada81e2a3a7ebbe89fb37c74e5c78bb2c

  • SHA256

    aa73aa782d43903550a0770b012f25b522bb113e93f568e96bde3420d9d173f8

  • SHA512

    c19b4443dc03551093e40fff24c1ed58fc314afe358e184304228f467d0905c65d7cdaca201378f47a4891173e1fed78d5b8785d3eb7a7cfbb91925c5ce73419

  • SSDEEP

    98304:FFLK3YRFmDxTzTcWSpmCjK58WgkkVp6BOZNVXYLEs7a5v/xaGU:FNwD8pmCu5ekvB4DoLMvJLU

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • aa73aa782d43903550a0770b012f25b522bb113e93f568e96bde3420d9d173f8
    .apk android

    com.ckck.turbofly

    JumpyBall


Android Permissions

aa73aa782d43903550a0770b012f25b522bb113e93f568e96bde3420d9d173f8

Permissions

android.permission.VIBRATE

android.permission.INTERNET

android.permission.READ_PHONE_STATE

android.permission.ACCESS_COARSE_LOCATION

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE