General

  • Target

    33b45614f75597469818dbc55412ffc94994fabfee20f08945894fdfdf4df9b3

  • Size

    11.3MB

  • MD5

    0fb3971c9a452c9af6f9511afc424847

  • SHA1

    a3584be708328d47acec9fd9080aaaf30da42c87

  • SHA256

    33b45614f75597469818dbc55412ffc94994fabfee20f08945894fdfdf4df9b3

  • SHA512

    ffde00c0d52d2fc5d2f81caaa6e49c458f68c1fba10196413519243d51d076cf90855694908f384a1a0c57fbe767d69b23862b72ac824b6564d7fe5676813f85

  • SSDEEP

    196608:90yTbjmxlIHsn1HMFDOUgmuHmwb+cCNSQ1q2Pni9oszLY/oX/IWu8gxL/4ZlEwVS:90suxuH7FyUfuHjlQ1q2Pi1Y/sIWf3jA

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Requests dangerous framework permissions 1 IoCs

Files

  • 33b45614f75597469818dbc55412ffc94994fabfee20f08945894fdfdf4df9b3
    .apk android arch:arm arch:x86

    bruenor.magicbox

    bruenor.magicbox.uiGameStarterActivity


Android Permissions

33b45614f75597469818dbc55412ffc94994fabfee20f08945894fdfdf4df9b3

Permissions

android.permission.WAKE_LOCK

com.android.launcher.permission.INSTALL_SHORTCUT

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE

android.permission.INTERNET