General

  • Target

    537a67aa5bbeb7ead5299b43efec743802b3ffb53f5ac45184463704ecc37749

  • Size

    7.5MB

  • MD5

    8390f091b5abee2d8e2da9deb409351c

  • SHA1

    45f178a070777748254666208b64865196382576

  • SHA256

    537a67aa5bbeb7ead5299b43efec743802b3ffb53f5ac45184463704ecc37749

  • SHA512

    0344e7bd5fcdb937f023a6797ff58550c5874637e750ef4e4379c016b1bf97741cc5987fb2441943d4fc8ca3035fd4c7a96a65eee2e6fab83bcbb137c198db1d

  • SSDEEP

    196608:XW874WdJhx4RT92B34592SpYy63TRk0d2m6EI3li1rF:hrx4N92BBY63TR9d2mGi1B

Score
6/10

Malware Config

Signatures

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 3 IoCs

Files

  • 537a67aa5bbeb7ead5299b43efec743802b3ffb53f5ac45184463704ecc37749
    .apk android

    com.flyersoft.moonreaderp

    .ActivityMain


Android Permissions

537a67aa5bbeb7ead5299b43efec743802b3ffb53f5ac45184463704ecc37749

Permissions

android.permission.GET_ACCOUNTS

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_PHONE_STATE

com.android.vending.CHECK_LICENSE

com.android.launcher.permission.INSTALL_SHORTCUT