General

  • Target

    8e976548f93fecd9b89eb9e9f6ff783faee417fa7ffa1bf9b0312cfb23c9d255

  • Size

    9.6MB

  • MD5

    c5bddfbdc7194ac23bc75ed9ce9300ef

  • SHA1

    f67bce10f5fdc4a2b6e1d751a2adc1cc2dc56c56

  • SHA256

    8e976548f93fecd9b89eb9e9f6ff783faee417fa7ffa1bf9b0312cfb23c9d255

  • SHA512

    bcb29e1fc2714bf1b9e8ff739a4ba24edfbcd25f86287b719f8bec171fb7aa14151f77bf07b9dac249f0f48fa9a7159ab7fff39bd7cf5c6cba9098d107fede76

  • SSDEEP

    196608:f3aUv5DxUI47skFhPr3FOfpvR0ekq9LKUT9Gw5Ufdx9IfS8GhXdKVfs:f3aUvd47s+13gR2ekcLrTKdvmSxAs

Score
6/10

Malware Config

Signatures

  • Requests dangerous framework permissions 5 IoCs

Files

  • 8e976548f93fecd9b89eb9e9f6ff783faee417fa7ffa1bf9b0312cfb23c9d255
    .apk android arch:arm

    com.yodo1.cmmm.megajump

    com.yodo1.sdk.game.Yodo14GameSplashActivity


Android Permissions

8e976548f93fecd9b89eb9e9f6ff783faee417fa7ffa1bf9b0312cfb23c9d255

Permissions

android.permission.READ_LOGS

android.permission.READ_PHONE_STATE

android.permission.SEND_SMS

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MOUNT_UNMOUNT_FILESYSTEMS

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.MODIFY_AUDIO_SETTINGS

com.android.vending.BILLING