General

  • Target

    6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370

  • Size

    17.5MB

  • MD5

    087f6135bb6879ae18b40f72cdb66de8

  • SHA1

    79943d56d978fce7f26800c74117e7725160322d

  • SHA256

    6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370

  • SHA512

    d73ec3a3054fca6e90a49b3a58756975eb973856e80b3d0d57e1ada5bbce7c3e46e3f9aca98b497d84339ddfefb07ca37da296a40d0f74555d3ffa495c3bf60a

  • SSDEEP

    393216:cCZp4RzJXMfn+T5vsXy4k7HvfBoN2Nmk0FQyPqc66J9:FkR1XQWhKy4k7yNAhi66J9

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 2 IoCs

Files

  • 6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370
    .apk android arch:arm

    com.droidgame.jewels

    com.droidgame.jewels.AppActivity


Android Permissions

6c2d32227d8b2bb62baa3db8f81e03a5cc92751cb3a883dd5e7419145504f370

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE

com.android.vending.BILLING

android.permission.ACCESS_WIFI_STATE