General

  • Target

    3f7cfbacb5aeb7e5bd67b0578584f740dc85dad284c2c98a66ca736745b94048

  • Size

    25.4MB

  • MD5

    40ed283dc89f724f57ea56e6a255fa00

  • SHA1

    e5f014f638e5b7337232e0a332ad026524c7be17

  • SHA256

    3f7cfbacb5aeb7e5bd67b0578584f740dc85dad284c2c98a66ca736745b94048

  • SHA512

    ada0cc70cc29f63cc9bada6b278ac100bf0c3faad85bdda318ea7f595b430e915585c1a7dee2ab64aaeebf2bf3da9e0acf9ad686e3b78b03be918ee864217381

  • SSDEEP

    786432:LLUeOL1AP6Q5Wu4czyj1rvBoTdCFuu7albd+0ZsDTtP1ol9aHZ:LIeOLdQ5D4czyjNBeukbd+0mZ9ol9E

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 3 IoCs

Files

  • 3f7cfbacb5aeb7e5bd67b0578584f740dc85dad284c2c98a66ca736745b94048
    .apk android arch:arm

    com.dxm.superCarRumble

    com.wlb3733.xhd3733Activity


  • ad_patch.jar
    .apk android
  • box.apk
    .apk android arch:arm64 arch:arm arch:x86 arch:x64

    com.a3733.gamebox

    com.a3733.gamebox.ui.SplashActivity


Android Permissions

3f7cfbacb5aeb7e5bd67b0578584f740dc85dad284c2c98a66ca736745b94048

Permissions

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

com.android.vending.BILLING

android.permission.REQUEST_INSTALL_PACKAGES

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE